Back to Search Begin New Search Save Search Auto-Notify
Avoiding Data Lockdown - Protecting Dat...
According to Ponemon, 88% of public sector organizations have experienced at least one cyberattack in the past two years due to public sector organizations offering an abundance of sensitive data for hackers. How can you prepare for these attacks? Join Otava and Carahsoft to discover the best methods used to prepare for cyberattacks. With the rise of hacking, ransomware, and cybercrime, Otava provides data protection services to ensure the sec...
Add Favorite
Log4Shell Exploit Explained
Join us as RangeForce's Director of Sales Engineering, Tanner Howell, walks us through a hands-on training module around the Log4Shell exploit. You will learn how the exploit works, see how it is applied to a vulnerable service, and see how to detect and mitigate the vulnerability. RangeForce is a hands-on cybersecurity upskilling platform covering nearly every cybersecurity topic from incident response, to secure programming, to advanced pene...
Add Favorite
The U.S. Securities and Exchange Commis...
The U.S. Securities & Exchange Commission recently proposed rules to strengthen the ability of public companies, funds, and advisors to combat cybersecurity threats and implement risk mitigation processes. SecurityScorecard was joined by Kristy Littman, U.S. Securities and Exchange Commission Chief of the Crypto Assets and Cyber Unit, Michael Daniel, President & CEO of the Cyber Threat Alliance and Friso van der Oord, Senior Vice Presi...
Add Favorite
Attack Surface Management from Palo Alt...
The attack surface of universities and school districts ballooned in recent years with the explosion of remote learning. It's never been more critical to have an up to date inventory of all assets - including IP addresses, domains, certificates, cloud infrastructure and physical systems - connected to your organization. You can't predict with certainty how you will be attacked in the future, but you can learn from recent attacks - and from the...
Add Favorite
Moving to an Endpoint-Centric Zero Trus...
Join SentinelOne on May 26th, to learn the Guiding Principles of ZERO Trust: Never trust, always verify-Treat every user, endpoint, application or workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required Assume breach-Operate and defend resources with the assumption that an adversary already has a presence within the environment. Deny by default and scrutinize all users, endpoints, data f...
Add Favorite
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to view these on-demands on various topics that your organization may be interested in: Session One: Cybersecurity Maturity Model Certification (CMMC) Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0 Clarifications on the different phases of inclusion for bidders, contractors, and service providers How the Executive Order f...
Add Favorite
Reimagine Cybersecurity
Situational awareness of cybersecurity risks is achieved through assessing and monitoring every corner of your network and the threats that are a part of that landscape. Explore key strategies and approaches to implement the next generation cyber safety structure ahead of the bad actors without ripping and replacing your existing cybersecurity tools. Gain insight on the challenges in the current approach to cybersecurity practices, and how to...
Add Favorite
The Executive Order and What it Means f...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that federal civilian agencies, working in partnership with the private sector, must meet in order to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic stands ready to help agencies meet and exceed EO requirements with an affordable infrastructure model tha...
Add Favorite
RockIT Learning Series Track: Google Cl...
During this webinar, we will cover: Google Cloud Platform (GCP) cloud-native solutions for governance and compliance Cost management Standards compliance for GCP Governance best practices Infrastructure automation
Add Favorite
Executive Order 14028 is Driving Legacy...
The clock's been ticking - Federal agencies are reaching the end of the first year of President Biden's signed Executive Order 14028, "Improving the Nation's Cybersecurity; Transforming Government Through Technology-Driven initiatives," on May 12, 2021. Join our complimentary webinar as we discuss this executive order which aims to tighten federal agency cybersecurity by requiring all federal government agencies to adopt multifactor authentica...
Add Favorite
Back to Search Begin New Search