Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer:
ISC2 Location:
Webcast
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Join us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public sector Pain...
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer:
Trellix Location:
Webcast
Automate, Analyze, Act: Streamlining Yo...
Join Elastic and the Arizona Department of Homeland Security (AZDOHS) to learn how their agency is leveraging Elastic to combat evolving threats. Elastic provides a centralized security information and event management (SIEM) platform and log aggregation, offering real-time visibility for improved cybersecurity and threat detection. With Elastic, organizations of all sizes can streamline log analysis, prioritize alerts based on threat relevanc...
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). Join us on April 30th for a webinar hosted by Fores...
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer:
FedInsider Location:
Webcast
Comprehensive Disaster Recovery Reduces...
Most K12 school boards forego comprehensive disaster recovery (DR) due to expensive and unpredictable pricing models, putting themselves at risk of a data breach or cyber attack. To help K12 schools mitigate this risk, Stage2Data partnered with Cohesity to offer a fixed-cost DR solution towards substantially lowering cybersecurity policy costs by 30%. In this webinar, attendees will benefit from shared insights on common challenges faced by K1...
Make Progress in Incident Response ...
When Executive Order 14028, “Improving the Nation’s Cybersecurity,” was issued in May 2021, it included directives for agencies to establish several incident response and logging procedures, including sharing information on incident detection and response, by August 2023. In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybers...
April 17, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.