Back to Search Begin New Search Save Search Auto-Notify
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer: ISC2
Location: Webcast
Add Favorite
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Join us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public sector Pain...
May 1, 2024
Organizer: DigitalXForce Government Team at Carahsoft
Location: Webcast
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
May 1, 2024
Organizer: WillCo Tech Government Team at Carahsoft
Location: Webcast
Add Favorite
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Automate, Analyze, Act: Streamlining Yo...
Join Elastic and the Arizona Department of Homeland Security (AZDOHS) to learn how their agency is leveraging Elastic to combat evolving threats. Elastic provides a centralized security information and event management (SIEM) platform and log aggregation, offering real-time visibility for improved cybersecurity and threat detection. With Elastic, organizations of all sizes can streamline log analysis, prioritize alerts based on threat relevanc...
April 30, 2024
Organizer: Elastic Government Team at Carahsoft
Location: Webcast
Add Favorite
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). Join us on April 30th for a webinar hosted by Fores...
April 30, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
April 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Comprehensive Disaster Recovery Reduces...
Most K12 school boards forego comprehensive disaster recovery (DR) due to expensive and unpredictable pricing models, putting themselves at risk of a data breach or cyber attack. To help K12 schools mitigate this risk, Stage2Data partnered with Cohesity to offer a fixed-cost DR solution towards substantially lowering cybersecurity policy costs by 30%. In this webinar, attendees will benefit from shared insights on common challenges faced by K1...
April 17, 2024
Organizer: Cohesity Government Team at Carahsoft
Location: Webcast
Add Favorite
Make Progress in Incident Response ...
When Executive Order 14028, “Improving the Nation’s Cybersecurity,” was issued in May 2021, it included directives for agencies to establish several incident response and logging procedures, including sharing information on incident detection and response, by August 2023. In August of that year, the Office of Management and Budget issued Memorandum 21-31 setting specific requirements for agencies to meet, for which the Cybers...
April 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search