Back to Search Begin New Search Save Search Auto-Notify
CSA AI Summit
The Cloud Security Alliance Virtual AI Summit brings together experts from around the world to provide key insights on how generative AI can benefit cybersecurity, how malicious attackers are using it and guidelines for responsible usage. The explosive growth of ChatGPT is due in large part to its delivery via the cloud, obligating CSA and its community to take a leading role in articulating the best practices and assurance ecosystem for AI as...
January 17-18, 2024
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
SANS Cloud Defender 2024 - Live Online
Hands-On Cyber Security Training Taught by World-Renowned Practitioners Attend Live Online   At SANS Cloud Defender 2024, choose from 48 interactive courses with hands-on labs. Practice your skills and compete against your peers during NetWars Tournaments, and network with your instructor and industry colleagues in real-time. Each course includes electronic and printed books, and several courses align with GIAC certifications!
January 8-13, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. This slogan fits into the Department of Defense mindset, which is always focused on how to reduce risk, but it’s a challenge to apply it to the federal government’s largest agency. An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in e...
November 28, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Identity Governance; A Critical Enabler...
Office of Management and Budget (OMB) Memorandum M-22-09 requires “agencies to achieve specific zero trust security goals” and designates “Identity” as the first of five pillars from CISA’s zero trust maturity model. Additionally, M-22-09 provides specific actions for the Identity pillar that include, employing centralized identity management systems that integrate with agency applications and platforms; leveragin...
October 5, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Network Security 2023
Learn real-world cyber security skills from top industry experts during SANS Network Security 2023 (September 6-11, PT). Join us Live Online or in Las Vegas, NV to experience interactive training with hands-on labs, practice your skills during NetWars Tournaments, and network with your peers in real time. SANS Network Security 2023 Features Courses In-Person or Live Online Core, DFIR, and Grid NetWars Tournaments on Sep 9 & 10 (In-Person O...
September 6-11, 2023
Organizer: SANS Institute
Location: Las Vegas, NV
Add Favorite
Emerging Trends & Best Practices to Com...
Ransomware attacks have become more frequent and sophisticated, causing significant damage and financial loss to businesses of all sizes. According to Verizon’s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years. The first half of 2022 saw nearly 236.7 million ransomware attacks worldwide, and hhe average cost of a ransomware attack was $1.85 million. Statistics reveal that a ransomware attack will occu...
August 24, 2023
Organizer: IT GRC Forum
Location: Webcast
Add Favorite
ICIT Virtual Briefing | Transform Your...
Join our webinar, "Transform Your Analytics: Unlock Hidden Insights in Your Data," to discover how AI can revolutionize your organization's decision-making process by providing actionable data and insights. We will explore two crucial topics: explainable AI and the importance of comprehensive datasets. This webinar will showcase how explainable AI makes complex data models transparent and interpretable, enabling users to understand the decisio...
August 22, 2023
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Identity Security Workshop
Identity is at the center of cybersecurity. With zero trust now the mandated de facto approach to strengthening cyber defenses, federal, state and local agencies need to build an identity-centric security approach encompassing both human and machine identities. This requires an enterprise wise rethinking of authentication, authorization, access to data, auditing and accountability in order to protect the IT backbone powering government. Identi...
August 15, 2023
Organizer: Nextgov/FCW
Location: Virtual
Add Favorite
ICIT Virtual Briefing | OT Risk Alert:...
OT security is finally getting its due attention and priority. As asset owners and OT security architects face growing risks and pressure to connect and converge their networks with those of IT, they need support from their leadership more than ever. Join Claroty and ICIT for a discussion of how CISOs can support these crucial teams to effectively secure these critical networks. Filtering out the noise of doomsday predictions, we offer CISOs p...
July 25, 2023
Organizer: Institute for Critical Infrastructure Technology
Location: Webcast
Add Favorite
Protecting Critical Infrastructure with...
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: ef...
June 22, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
Back to Search Begin New Search