75 past events found
+ 4 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
AFFIRM Up Lift: Strengthening Cybersecu...
In today's digital age, cybersecurity has become a crucial component of our nation's security. The recent cyberattacks on critical infrastructure, federal agencies, and private sector entities have shown us the severe and far-reaching consequences of cyber vulnerabilities. As a result, the Biden-Harris administration has made strengthening cybersecurity a top priority. On May 12, 2021, the Executive Order on Improving the Nation's Cybersecurit...
May 15, 2024
Organizer: AFFIRM
Location: Webcast
Add Favorite
Focus on Cyber Resiliency in a Hostile World
The internet is an increasingly dangerous place. The FBI warns of Chinese threats to U.S. critical infrastructure, while the National Security Agency releases guidance for strengthening AI system security. Meanwhile, agencies still wrestle with phishing, ransomware and myriad other threats that occur every day. At the same time, government organizations are expected to implement zero trust architectures, improve identity and access management,...
May 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Ransomware Detection and Response Virtu...
Become a black belt in ransomware detection and response and get a blueprint to build your organization’s cyber resilience at a Trellix virtual workshop.Cyber experts will help you identify gaps in your current architecture and put together an action plan that helps you take back control and defend against ransomware. Join experts and your peers for an interactive workshop. Map out a plan of action in your personal workbook Take part in...
March 5, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Secure Schools, Bright Futures: Cyberse...
K-12 institutions are focused on providing continuous, safe, and secure learning environments for students and staff. Despite being resource constrained, school districts must adhere to fundamental cybersecurity practices such as FERPA compliance and ransomware prevention. Join us to learn about the top cybersecurity best practices for K-12 school districts and how Palo Alto Networks approaches these in order to safeguard people and data. In...
January 31, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Using Data to Fortify Network Defenses
One Cybersecurity and Infrastructure Security Agency (CISA) program that has been widely adopted throughout the federal government also is one of its longest-established – the Continuous Diagnostics and Mitigation (CDM) program. Introduced in 2012, the program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The program has evolved over the past decade to add new capabilities, including c...
October 3, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
America's Software Supply Chain: How Se...
The persistence of nation-state actors has introduced a threat to America’s cybersecurity landscape that has never been seen before. Ample countermeasures have been prescribed through various White House, DoD, and CISA guidance that places responsibility on government and private industry to follow these new guidelines for the development of secure software. As we turn the corner toward the close of the federal fiscal year and begin cybe...
August 31, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search