135 webcasts found
+ 96 past events found
Back to Search Begin New Search Save Search Auto-Notify
More Securely Innovate the Enterprise
In the continually changing landscape of modern governance, federal civilian agencies must prioritize secure innovation within their environment. While harnessing technological advancements is crucial for enhancing public services and operational efficiency, it must be done hand in hand with a resolute dedication to cybersecurity. Red Hat hosted the More Securely Innovate the Enterprise event in Denver where government and IT professionals cam...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Future-Proofing Aerospace & Satellite C...
Amid a backdrop of escalating cyber threats within the aerospace & satellite (A&S) industry, and with federal agencies like the U.S. Space Force, NASA, and the Intelligence Community deepening ties within the supply chain, cybersecurity compliance has emerged as a linchpin for success. As the Space Force unveils its largest budget yet at $30 billion for FY24, the urgency for A&S vendors to align with federal cybersecurity standards...
Add Favorite
Charting China's Climb as a Leading Glo...
Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilit...
Add Favorite
How to Improve your Cybersecurity Readi...
With cyber threats increasing in volume and sophistication, effective privileged access management (PAM) is now crucial for educational institutes. Best-in-class centralized privilege management enables institutes to establish an agile framework for Zero Trust access today and tomorrow, regardless of operating system (OS) or domain. In this webinar, learn how Delinea can help you protect your privileged accounts. During this on-demand webinar,...
Add Favorite
Aware and Resilient - WEST 2024 Webinar...
Following WEST 2024, Fidelis hosted a webinar to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In the past few years NIST, CISA, and others have begun discussing cyber resiliency. What does this mean to you and your organization? Watch the on-demand webinar now hear from Fidelis' Director of Systems Engineering, Joe Kattner, as he discusses the shift in thinking...
Add Favorite
Meeting the Quantum Deadline: Migrating...
According to OMB M-23-02, agencies are directed to submit a prioritized inventory of information systems and assets, excluding national security systems, that contain CRQC-vulnerable cryptographic systems to ONCD and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA). No later than 30 days after the submission of each annual inventory of cryptographic systems required under Section II of this memorandu...
Add Favorite
Empowering Public Sector Cybersecurity:...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that government must meet to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic and MAD Security effectively address the cybersecurity challenges ready to help agencies meet and exceed EO requirements with an affordable infrastructure model that keeps all ag...
Add Favorite
Strategic Guidance On Solving M-24-04
M-24-04 requires that federal agencies must have a clear understanding of the devices connected within their information systems to gauge cybersecurity risk to their missions and operations. However, with today’s heavily complex environments this action requires a level of expertise and precision that poses its own set of challenges. To that end, Asc3nd Technologies Group, the premier federal partner in IoT and OT security, invites you t...
Add Favorite
Bridge the Gap Between Productivity and...
Remote access use cases have exploded across the government. Unfortunately, security is often not top of mind as these solutions are deployed, whether because they are urgently implemented or stretched for inappropriate use cases. Yet identities and their privileges are at the heart of almost every cyberattack today and remote access software could easily be misused or co-opted. Watch the on-demand recording to understand how BeyondTrust...
Add Favorite
Back to Search Begin New Search