Forcepoint ONE- All The Cyber Tools You...
If you work in the public sector, this event is for you! Please consider joining Carahsoft's Nikhil Gupta, Sales Engineer Team Lead, as we discuss the capabilities of Forcepoint ONE as it applies to your cybersecurity needs. We'll spend the majority of the time going over the solution, but we've also allotted time at the end of the presentation to answer any questions you may have.
Threat Hunting Masterclass Session 1: H...
In the first session of the Threat Hunting Masterclass you’ll learn: How to properly understand and fully maximize your use of the tools and technologies behind threat hunting How to uncover common pitfalls and paradigms that are present when doing advanced threat hunting in live environments A view from the front: what works, and what needs refinement when everything is moving inside a customer environment.
Bridging the Gaps of Cybersecurity
With 70% of government breaches caused by phishing, and the public sector being the second most victimized industry, the importance of aligning cybersecurity priorities is even more critical to winning the war against phishing. View this on-demand webinar to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions and learn expert insights on how you can protect your agency by combining the po...
Building for Secure Multicloud Environm...
Embracing a decentralized modern enterprise IT ecosystem means accepting that mission critical workloads don’t just run inside of the data center. Modern customer and employee experience demands from the business are rapidly forcing IT leaders to adapt to a hybrid environment approach. Application and data are increasingly spread among multiple agencies, legacy data centers, hyperscaler clouds, software as a service (SaaS) providers, and...
Getting the Golden Ticket to an ATO on AWS
FedRAMP, DFARS, and PCI are just some of the frameworks that public sector organizations must navigate on the path to an ATO on AWS. Unfortunately, these organizations report that it can take up to 18 months to achieve their ATO. However, it doesn't have to be this way. Join our complimentary webinar to learn actionable steps you can take today to simplify and expedite your accreditation process. AWS, CTAC, and Kion will share how the ATO on A...
Proofpoint's Nexus People Risk Explorer
Attendees will learn more on how Proofpoint's Nexus People Risk Explorer can benefit their organization. They will be able to see how Proofpoint's Nexus People Risk Explorer gives security executives visibility into the risk people pose to the rest of the organization. Attendees will also see how this tool can identify, assess, and mitigate people-based cybersecurity risks.
OMB M-21-31: Essential Insights for Fin...
In August 2021, the Office of Management and Budget released a memo that outlined the requirements for section 8 of Executive Order 14028, Improving the Nation's Cybersecurity. The memo outlines the requirements for each federal agency to collect, retain, and manage logs with a focus on centralized access and visibility for the Security Operations Center (SOC) of each agency. With the upcoming EL1 deadline, learn how to help your agency meet t...
Attack Surface Management: From Reactiv...
As organizations continue to digitize their business and employees are empowered to leverage these capabilities, it’s no wonder security teams struggle to keep track of infrastructure, applications, cloud services and SaaS usage—let alone ensure security policies are adhered to across these environments. The attack surface is dramatically and vastly expanding, and without the proper automation, it is unlikely that security teams wi...
Cyberthreats in the Public Sector: How...
With cybersecurity threats becoming more frequent and severe, government institutions are especially vulnerable. The widespread threats on public infrastructure demonstrate how crucial it is for state, local government, and education entities to gain a solid understanding of how to mitigate risks. With increasing premium and restrictions in coverage, are you rethinking your approach to cyber insurance and ways to proactively manage your risk?...
F5 Distributed Cloud Webinar
Overloaded government agency IT teams face escalating cybersecurity concerns and tight budgets. To make matters worse, agencies are experiencing the challenges associated with increased operational complexity as they turn to multi-cloud networking. Unfortunately, many IT professionals in these evolving complex environments are left with more questions than answers. Who protects what? Who supports what? What if I don't have training for that en...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.