Back to Search Begin New Search Save Search Auto-Notify
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). Join us on April 30th for a webinar hosted by Fores...
April 30, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
April 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer: ISC2
Location: Webcast
Add Favorite
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Join us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public sector Pain...
May 1, 2024
Organizer: DigitalXForce Government Team at Carahsoft
Location: Webcast
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
May 1, 2024
Organizer: WillCo Tech Government Team at Carahsoft
Location: Webcast
Add Favorite
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
May 2, 2024
Organizer: Harpoon Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires pro...
May 2, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing Tomorrow: The Role of CTFs in...
Join Hack the Box and Carahsoft for an insightful webinar exploring how Capture the Flag (CTF) events serve as a dynamic platform for fostering cybersecurity talent within universities and state/local government agencies.
May 8, 2024
Organizer: Hack the Box Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search