11 past events found
+ 4 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Keeping Students Safe Online: How to Ma...
K-12 schools are lucrative targets for cyberattacks because they house vast amounts of valuable student data. For these schools to implement a comprehensive cybersecurity strategy – one that enables leading-edge detection and response – their leaders must generate maximum value out of their cybersecurity investments. That means deploying tools and services with a dual purpose or multiple advantages, emphasizing stretching cybersecu...
January 31, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Future-Proofing the Public Sector: Wind...
The phasing out of Windows 10 is a significant transition period for many public sector IT teams. This move coincides with another vital IT transformation moment – the proliferation of generative AI. And, as always, IT leaders have to navigate the evolved cyber threats resulting from these new and exciting cyber abilities. More than ever, staying up to speed with technology means making the right IT investments. Join Government Technolog...
January 30, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
January 26, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Zero Trust - Securing Your Business App...
Conventional wisdom suggests that a zero-trust framework or architecture be implemented as part of a holistic security strategy. “Trust nothing, verify everything” seems like the safest bet. Yet, it remains unclear how this approach keeps your organization's connectivity, which supports your most critical business applications, more secure without impeding their business intent. Uncover the most pressing network security policy iss...
January 17, 2023
Organizer: SANS Institute
Location: Webcast
Add Favorite
Addressing the Cyber Security Prioritie...
Current guidance has laid out the cybersecurity priorities that federal agencies should adhere to for the upcoming fiscal year 2024 budget cycle. Civilian agencies will need to focus on making investments within the three cyber investment priority areas: Strengthening the Foundations of Our Digitally-Enabled Future, Deepening Cross-Sector Collaboration in Defense of Critical Infrastructure, and Improving the Defense and Resilience of Governmen...
September 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Learn How to Find Security Threats Befo...
Every network has a security vulnerability. Vulnerabilities obviously lead to threats. Do you know where your vulnerabilities and any hidden threats are located? With major security breaches happening every year to businesses and government agencies of every type, don't you want to find (and fix) your network BEFORE a hacker finds and exploits the weakness? In this webinar, we explain what you need to do to actually protect yourself from vulne...
February 1, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
ICS Cyber Resilience, Active Defense ...
Join members of the SANS Industrial Control Systems (ICS) Team in a new ICS Webcast Series: ICS Cyber Resilience, Active Defense & Safety. Presenters will address the recent increase in attack campaigns and impacts seen across multiple sectors in the ICS space. Topics of discussion will include ransomware impacting critical infrastructure, detecting advanced adversaries inside ICS networks, and a variety of other threats and defenses. This...
January 11, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
DevSecOps and Application Threat Landsc...
Over the past few years, we have seen drastic, but welcome, changes in how organizations manage their own software and code. Organizations are embracing security at the code level, encouraging developers and security teams to work closely together. Giving way to the term “DevSecOps”, developers now integrate automated processes to build and ship code, streamline the development cycle, and ship code more securely. However, cyber adv...
December 10, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Ransomware in Focus: How AI Stays One S...
As the world continues to endure ongoing global disruption, cyber-attackers have been constantly updating their tactics in light of emerging trends. According to MIT Technology Review, 121 million ransomware attacks were recorded in the first half of 2020, each one attempting to encrypt private data and extort payment for its release. The automated elements of these attacks, malware that moves faster than security teams can respond, is one of...
March 17, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cyber Electromagnetic Activities and Si...
"You go to the attack with the most advanced alignments, but you win with the side ones". Modern operations see even actual this quote in two new domains of warfare: electromagnetic spectrum and cyberspace. These new domains are potentially accessible from every classic one and represent dimensions that commanders have to schedule and use both during an operation by using 'Sensors' and 'Effector'. To plan a mission that takes into account acti...
March 11, 2021
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Back to Search Begin New Search