104 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
Overcome Organizational Silos to Improv...
Local and state governments have many endpoints and networks to manage and protect, but their operations come under increased threat of cyberattacks as the levels of security across departments become fragmented. Creating a fully integrated approach improves visibility and cohesion among branches of an agency, allowing them to take a proactive stance when it comes to mitigating risks. Seeing across silos on this matter strengthens an organizat...
October 4, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Securing the Vote: A Roadmap to Success
Efforts to breach U.S. voting systems and influence election outcomes by state-sponsored, criminal and malicious insider actors are only growing in sophistication. More than ever, local and state government agencies must be able to rely on dynamic, full-spectrum security solutions that protect the entire election process and those who work to preserve outcomes. A phased approach is required to ensure risks are fully mitigated before, during an...
September 30, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Discover Everything You Need to Know Ab...
As our technological landscape grows in complexity and sophistication, so does our data. It quickly piles up, leaving state and local governments unsure of where all their data is, what it contains and who has access to it. Not only is this an organization nightmare, but it also creates unnecessary privacy risks. With the right solutions, agencies can gain a full view of all the data and where it resides, making it easy to access this informat...
September 28, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Why Internal Fraud Often Goes Undetecte...
State and local governments lose billions of dollars a year through fraudulent claims and abuse of government services and benefits. Efforts to fight fraud often focus on combatting external threats, ignoring the very real threat of internal fraud. While this has always been a challenge for state and local governments, significant amounts of new federal funding through the Infrastructure Investment and Jobs Act (IIJA) and other pandemic relief...
September 22, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Managing Cyber Risks: The Role of Cyber...
Cyber insurance has become a big part of an overall cybersecurity strategy for many state and local governments. But cyber insurance is changing quickly. Premiums will likely increase significantly in the coming months and years. Policies are changing what incidents they cover, and in what circumstances. They may not offer the protection officials think they do. And cyber insurance does nothing to protect an organization against another attack...
September 21, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Anatomy of a Ransomware Operation
Ransomware attacks are no longer “drive-by” events. Encryption is only one of the problems among a list of others that include operational disruption and data exfiltration for extortion, ransom, sale, and re-sale. Join SANS Senior Instructor Jake Williams, SANS Instructor and BlackBerry Principal Incident Response Consultant Ryan Chapman, and BlackBerry Most Distinguished Threat Researcher Dmitry Bestuzhev as they dissect and anal...
September 16, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Common Persistence Strategies - Emulati...
Get a preview of material directly from SANS SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses. There are many stages in the attack lifecycle in which we can detect or prevent an (advanced) attacker from getting closer to their final objectives. One thing we always come across however is that the attacker likes to persist in your environment, be it for two days, two months, or two years. It is important fr...
September 15, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
New and Updated: Top 20 Cyber Attacks o...
This webinar is a preview of a new report - the updated version of the Top 20 Cyber Attacks on Industrial Control Systems. The attack "ruler" of 20 standard attacks now includes nation-state-grade ransomware, IT-targeted ransomware that triggers "abundance of caution" OT / ICS shutdowns, IT-targeted ransomware that triggers OT shutdowns when IT systems vital to OT networks are impaired, and other timely updates. Cloud-seeded ransomware / supp...
September 15, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Vulnerability Management: Leveraging Context
So you have a vulnerability management program. Great. Excellent. But are you able to let the management team know if it is being effective or not? In this final Vulnerability Management series webcast, join Jonathan (MGT516 co-author and SANS certified Instructor) as he discusses how to show your program is being effective through metrics and measures. He will discuss metrics that a new program can start creating and generating on day 1 as we...
September 14, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Creating Frictionless Government and Ed...
Government and education services should be easily accessible and simple to use for a wide variety of constituents. As the COVID-19 pandemic demonstrated, constituents can get frustrated and feel left behind when organizations have complex processes and tools, and not all users will be on the same level of the digital playing field. Thankfully, government and educational agencies have shown a willingness to transform their approaches to meet i...
September 14, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search