Cyber Resiliency for Critical Infrastru...
The nation’s critical infrastructure is more connected and automated than ever before – and cyberattacks continue to rise. One recent study showed a 140% increase in cyberattacks on critical infrastructure in 2022. State and local cybersecurity leaders must be prepared. These attacks don’t just threaten security and data privacy – they can impact the economy, transportation networks, crucial government facilities and ut...
Mandiant Incident Response Services for...
Join us to learn how Google Public Sector & Mandiant approach helping public sector and education organizations reduce their organizational risk in the event of a cyber attack. Our experts will provide an overview of the Mandiant Incident Response Services and how they can help increase confidence in their operations before, during or after a cyber incident. Given the limited budgets and lack of cybersecurity talent, these services can he...
Secure Your Workforce with Phishing-Res...
Phishing continues to be a prevalent threat, with organizations falling victim to credential-based attacks, resulting in costly breaches. Traditional multi-factor authentication (MFA) methods are vulnerable to phishing attacks. Discover the journey Okta customers are taking towards phishing-resistant authentication in this insightful webinar. Join our webinar to explore: The key features of phishing-resistant authenticators Strategies to defen...
April 24, 2024
Organizer:
Okta Location:
Webcast
What You Need to Know about the NIS II...
Come and learn from ENISA, the European Union's Agency for Cybersecurity), about the NIS2, the EU's cybersecurity legislation, which will come into force this year across all the EU's critical sectors. This seminar will help you get ready for the NIS2 incident reporting and security measures requirements, what NIS2 will mean for organizations doing business in the European Union, and what skills you may need to implement the NIS2. This online...
Conquer Any Cybersecurity Challenge: Th...
The public sector faces unique challenges around enhancing security and streamlining operations – and it can be difficult to address these issues due to resource constraints, increasingly complex environments, a rise in cyberattacks and data overload. Luckily, emerging technologies are helping to change this. Explore the tools that can help organizations improve attack surface visibility, automate repetitive manual tasks and provide anal...
Metrics that Matter for Critical Infras...
Critical infrastructure services in North America face accelerating threats from both nation-states and other sophisticated threat actors. Governments globally are grappling with how to best balance incentives, support, and direct oversight. Meanwhile, critical infrastructure owners and operators face significant challenges with technology, staff resources, and expertise to better manage cyber resilience. For instance, the healthcare industry...
April 23, 2024
Organizer:
FedInsider Location:
Webcast
Federal Executive Forum Zero Trust Stra...
Zero trust continues to be a crucial piece of cybersecurity initiatives. But how are strategies evolving to stay ahead of tomorrow’s cyber threats? During this webinar, you will gain the unique perspective of top government cybersecurity experts. Panelists also will share lessons learned, challenges and solutions, and a vision for the future.
Spring Cyber Solutions Fest 2024: Attac...
In its fifth year, SANS Cyber Solutions Fest aims to brings together an ensemble of security professionals, solution providers, gurus and experts ready to share knowledge about the latest developments and innovative technologies in the cybersecurity industry. Join the attack surface & vulnerability management track to hear from chairperson Matt Bromiley and a host of leading cyber security experts as they walk through specific use cases an...
Spring Cyber Solutions Fest 2024: Cloud...
Today, most security professionals are actively architecting and implementing cloud security controls across SaaS, PaaS, and IaaS environments. We’ve learned that what once worked on-premises may not work quite the same in the cloud, and a wide range of new and innovative security platforms and services have emerged and evolved in recent years to address critical cloud security use cases and categories, including: Cloud security monitori...
Configuring Microsoft 365 for CMMC Compliance
Ensuring cybersecurity compliance with Department of Defense (DoD) contracts is vital. Whether your organization serves the DoD supply chain or employs contractors within DoD agencies, understanding Cybersecurity Maturity Model Certification (CMMC) guidelines is essential. Trusted Microsoft partner RSM can help navigate the complexities of CMMC and provide expert guidance to ensure compliance at every level. Learn how to: Review and assign con...
April 18, 2024
Organizer:
Microsoft Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.