Back to Search Begin New Search Save Search Auto-Notify
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
June 6, 2024
Organizer: ThreatLocker Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Assuring Change: Infusing Zero Trust in...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
APEX, CMMC and Project Spectrum
Securing government contracts is becoming increasingly challenging due to stringent requirements such as FedRAMP and CMMC. If your clients aim to secure contracts with the DoD, join us for this timely web discussion, hosted by Cyturus, in collaboration with Carahsoft and The Cyber AB, exclusively for APEX Accelerator Consultants. This session aims to equip APEX Consultants with resources specifically designed for APEX consultants and their cli...
June 6, 2024
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
June 10-12, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
June 10-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, aims to delve into the nuances of GAI, particularly focusing on its utilization by...
June 11, 2024
Organizer: Trend Micro Government Team at Carahsoft
Location: Webcast
Add Favorite
Cohesity Cyber Incident Workshop
Joining Cohesity for an exclusive half-day workshop, participants will be guided through a comprehensive cyber event simulation. Throughout the workshop, they will triage, diagnose, and respond to simulated cyber threats, reflecting on the incident response process and exchanging perspectives and best practices with experts and fellow participants in Operation Stormfall. It's not just about preparedness; it's about empowerment, as atte...
June 11, 2024
Organizer: Cohesity Government Team at Carahsoft
Location: Huntsville, AL
Add Favorite
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event will showcase an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats....
June 12, 2024
Organizer: SpyCloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. We invite you to join our webinar as we explore the intricate and powerful combination of Zero Trust and insider risk management! During this session, our speakers will: I...
June 12, 2024
Organizer: DTEX Sytems Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search