81 past events found
Back to Search Begin New Search Save Search Auto-Notify
Managing Disruptive Technologies
Disruptive technology is everywhere and has the ability to disrupt established organizations across the globe. Attendees will learn how to assess the impact of disruptive technology and identify the appropriate safeguards necessary to mitigate risks. They will also learn the appropriate steps to take to adapt the technology and monitor its performance over time. Virtual Summits and the CPE credits you can earn for them are free for ISACA membe...
March 13, 2024
Organizer: ISACA
Location: Virtual
Add Favorite
CIO Digital Summit: The Future of IT De...
Despite the challenges in the global economy there is a real sense of optimism in IT organizations with increased budgets and the return on new digital channels starting to show. This optimism could be short-lived as customers and employees hold their loved brands to a whole new standard of experience. To keep up, companies will have to embrace a whole new toolbox of cultural and digital technology! Join 70+ senior IT leaders on business-criti...
February 14-16, 2023
Organizer: GDS
Location: Webcast
Add Favorite
Cut Through the Complexity: How to Mode...
Navigating building permitting processes can be a challenge for both governments and constituents. There are digital solutions available that can help government agencies provide an effortless way for residents and contractors to submit, review and pay for permits, but deploying these solutions can be complex. Government Technology is bringing together industry experts for a panel discussion on how they worked through the complexity and succe...
January 24, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Frictionless Data Security and Compliance
Seamless collaboration is essential for good government. Teams must be able to share information seamlessly and easily – and securely. That’s why agencies need security, privacy and compliance tools that safeguard sensitive data without slowing down work. With a frictionless approach to security and compliance, governments can protect the flow of information with modern tools that integrate seamlessly into existing back-end system...
January 18, 2023
Organizer: Government Technology
Location: Webcast
Add Favorite
Reducing Risk and Increasing Efficiency...
Hybrid and remote employees in state and local government workforces are increasing IT’s focus on endpoint security to reduce risk. Short-staffed agencies are looking to maximize efficiencies across the board. Personal computers, laptops and other end-user devices are a crucial component to increase employee productivity and enable resiliency. Join Government Technology on December 14 at 10am PT/1pm ET as we discuss why choosing the rig...
December 14, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
ICS Consequence-Driven Incident Respons...
Consequences of modern cyber-attacks impacting control systems can range from large power grid blackouts to large cities or major regions, failure of critical manufacturing equipment with massive financial loss, paralyzing smart city infrastructure such as transportation in large municipalities, inflict serious environmental damage, or worse, cause injury or death to facility workers. The obvious choice for ICS security managers and technical...
December 9, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
The State of Encrypted Attacks: What's...
A vast majority of today's attacks use encryption to bypass defenses. Zscaler's ThreatLabz team analyzes data from the world's largest security cloud, processing over 250 billion transactions per day, to uncover what threats are hiding in SSL/TLS. Join this webinar to learn and discuss how encrypted attacks are evolving, including: The fastest growing threat types The most targeted industries/geographies Where most enterprise defense strategie...
December 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Threat Exposure Management Solutions Forum
Threat Exposure Management (TEM) is a new approach to security designed to help organizations identify, prioritize and manage unexpected risks or exposures. This approach differs from standard threat management practices by taking a contextual view of threats, focusing on establishing a process for how information is collected and integrated together to inform better and faster decision making. Though the term, threat exposure management, is n...
December 2, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
What Resilience Means Now
Are institutions prepared to deal with escalating cyber threats and other potentially disruptive events? This session will examine the interconnections between cybersecurity, business continuity and disaster recovery — and how a holistic approach to these critical issues can strengthen resilience. We will explore topics such as: Using Zero Trust to stay ahead of increasingly numerous and sophisticated threats Building executive level sup...
November 21, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
2022 SANS Solutions Forum: A Practical...
There is no doubt that Zero Trust has become one of the main topics in the cybersecurity industry. Since the US Federal Government mandated agencies to accelerate the adoption of Zero Trust and issued detailed guidelines on implementing a Zero Trust Architecture in the second half of 2021, Zero Trust has become both the ‘de facto’ cybersecurity approach and a controversial concept used by some as a marketing ploy. But what is Zero...
November 18, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search