Ensure Resiliency Against Cyber Threats
Attendees of this webinar learned:Preparing for Ransomware Attacks and Rapid RecoveryCrafting Effective Grant ProposalsThe Advantages of Working with Assured team of experts
Fortifying The Expanding Role Of The Fe...
In the last five years, OMB and CISA have been expanding the role of Federal cybersecurity programs beyond traditional IT. As the threat has expanded deep into software supply chain, third-parties, IOT/OT and cryptography, understanding where to focus has become more difficult and resource intensive. The CISO and their staff constantly balance mission priorities with zero trust goals, audit findings and modernization efforts while continually...
Strengthening Cybersecurity and Digital...
Across the nation, Government agencies are redefining digital interactions with the public. They’re modernizing systems and apps to improve service quality and speed. They’re developing a single, secure account for frustration-free access to everything. Yet, building strong digital relationships with the American public shouldn’t come at their expense. Neither should it come at the cost of your mission-critical applications....
Transforming Pension Security: A Human-...
State and local government pension systems administrators have the important responsibility of ensuring strong security measures with seamless user experiences in a time of growing digital threats and ever-changing cybersecurity challenges. Attendees joined this webinar to see how advanced data analytics and better digital identity verification made possible by Splunk and ID.me can completely change the way pension programs protect and operate...
The Role of Integrity Within Zero Trust
Attendees who joined this webinar learned about:Zero trust as it applies to federal agency cybersecurityThe role integrity plays in enforcing a zero trust approachMethods for achieving integrity using file integrity monitoring (FIM) and security configuration management (SCM)
A New Paradigm for Managing Third-Party...
The MOVEit and GoAnywhere attacks in 2023 ushered to the forefront the importance of having a viable and adaptive third-party risk strategy. If there had ever been the feeling that third-party risk was a secondary stakeholder in the cybersecurity space, the importance of which was elevated only for short periods of time during a crisis, these two attacks shattered that notion entirely. This new reality has compelled security strategists to rap...
Automated Policy Enforcement for CMMC w...
CMMC is an important program for hardening the cybersecurity posture of the defense industrial base, yet implementation can be a challenge for teams unfamiliar with automating compliance measures. Attendees joined Anchore experts on August 27th for a webinar that explored the evolving areas of CMMC and SSDF compliance parameters. During this webinar, we demonstrated how Anchore Enterprise can help your agency:Implement and automate compliance...
Security, Observability, Cloud Developi...
Splunk and MBL Technology dove into Splunk strategies for new and existing customers in the Federal government. Learn more about Splunk’s suite for Cyber Security, Compliance, and Observability. Splunk is the leader in security and observability, providing enterprise visibility and insights across IT stacks with extensive past performance across the entire DOD and Civilian Government. Our existing customers are migrating to the cloud, bu...
How and Why You Should Build Resident P...
During this webinar, attendees explored the challenges states face when providing secure digital services to their residents and how a strong identity posture allows you to build portals that improve the level of service to your communities. We highlighted successful implementation strategies featuring examples from state agencies and discussed how Okta and Active Cyber can assist. Topics included how to begin providing and informing governmen...
CMMC DIB Supply Chain Implications ...
This webinar answered questions like, “What are the responsibilities for sub-contractors? How do subs impact managing risk, CMMC score, and costs? Should I work with a Managed Service Provider (MSP)?” In this webinar we:Reviewed CMMC implications and detailed obligations for the DIB supply chainExamined how to manage risk throughout the supply chain and the responsibilities of the main contract holder as well as involvement require...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.