Taking the Kinks Out of the Supply Chain
CANCELED
Supply chain management is critically important to running and maintaining an agency's IT systems, however it has not historically drawn much attention from the C-suite. Currently, many federal agencies use a manual process managed on spreadsheets which can lead to increased cost and risk.New directives have mandated that the Department of Defense must begin monitoring the supply chain within the Department's Risk Management Framework. These c...
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Blockchain & Distributed Ledger: Not Ju...
Expanding the Federal Blockchain Use Case to Securing Communications When you think of blockchain, the first things that come to mind are Bitcoin and other cryptocurrencies. In the federal government, blockchain technology is leveraged for missions that rely on the free flow of accurate, "need-to-know" information and communications that are less than secure. The native security capabilities of blockchain dramatically improve the abilities of...
Managing F5 Deployments in Azure with H...
The rate at which new applications are being deployed is continuing to increase, with organizations often employing 10 or more application services to power them. This drives the need for organizational visibility and enhanced collaboration among network, security, ops teams, and even developers to build and roll out applications securely and at speed. To deploy platform independent application services - that scale on demand without hindering...
QSMO and CDM Webinar
The Evolution of How Cybersecurity is Delivered as a Shared Service Join Palo Alto Networks for a virtual fireside chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) & Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies. Hear how...
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Why Secure Email Gateways Are Not Enoug...
Join Cofense and Carahsoft for cybersecurity expert insight into the challenges of defending against sophisticated phishing attacks; specifically, how to defend against the phishing email that evades your secure email gateways.Cofense Vice President of Sales Engineering, Andy Spencer, will be sharing insight into the current threat landscape as seen through the eyes of the end user and how threat actors are getting past security perimeter cont...
Bottom Up and Top Down: A Layered Appro...
Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams. This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration. Locking down your wo...
Dynamic Cloud Webinar
Recent events highlight the critical need for always-on, cloud-delivered access for distributed user communities - distance learning, remote workers, and research to name a few. In such situations, the cost of speeding delivery can lead to concessions or oversights in the security posture. As dynamic cloud environments become more common in government and educational organizations, IT teams must understand their responsibilities in the Shared...
True Cybercrime Stories
Join Trustwave on Wednesday, September 2nd for a live webinar. Whether you are a twenty-year veteran or have just started your journey into the world of cybersecurity, you will find this remarkable event entertaining and very beneficial. We have assembled a small handful of interesting, real-world cybercrime stories told by actual cyber investigators. Each story a cautionary tale on a grand scale!
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.