Step-by-Step to SASE: A Guided Approach...
Cybersecurity in the public sector is complex — especially when you're balancing compliance mandates, legacy systems, and growing remote work demands. For many agencies, Secure Access Service Edge (SASE) has become the goal. But getting there? That’s the challenge. Join Government Technology, Palo Alto Networks, and LevelBlue for a discussion that will dive into a clear, step-by-step guide to help you build a strong SASE strategy n...
Defense in Depth: Multiple Layers of Pr...
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks. Join us for this expert-led webcast to explore how to implement and evolve a Defense-in-Depth (DiD) strategy tailored to your organization...
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer:
FedInsider Location:
Webcast
Model Your Way to Better Cybersecurity
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. T...
July 9, 2025
Organizer:
CMU - SEI Location:
Webcast
The Intersection of Cyber Threats, Frau...
Fraud actors are increasing in sophistication with tools like AI. From benefit disbursements to procurement processes, fraud often hides in plain sight across siloed systems, slow workflows, and outdated tools. Splunk can bridge siloed tools and data, bringing teams together via a data-informated reality, and stopping fraud in its tracks. In this session, we will explore how public sector agencies can tackle fraud by improving operational effi...
July 8, 2025
Organizer:
Splunk Location:
Webcast
Streamline Your Compliance Journey and...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory standards like NIST 800-53, RMF, and other frameworks. Join us for this informative webinar, where we’ll demonstrate how...
The Gartner Top Trends in Cybersecurity...
In an era of relentless technological and business disruption, the limits of security programs and team performance are constantly tested. Cybersecurity leaders face the dual challenge of not only protecting their organizations but also enabling business value. To prove the effectiveness of security programs in 2025, leaders must focus on embedding resilience at the organizational, personal and team levels. Join this complimentary Gartner webi...
July 1, 2025
Organizer:
Gartner Location:
Webcast
The New Print Frontier: Securing Endpoi...
Printers are no longer just peripherals — they’re endpoints. And for many organizations, they’re a vulnerable one. Join HP’s Steve Inch, for a live discussion that reveals how the evolving cybersecurity landscape — especially the rise of quantum computing — demands a new level of vigilance when it comes to securing your print infrastructure. We’ll dive into:Practical steps you can take immediately to i...
Mobile Security Series: Securing the Hu...
Phishing today isn’t just email. Adversaries are now exploiting SMS, Signal, LinkedIn, QR codes, and more to directly target your people—on the devices they rely on most. These mobile-specific tactics—like smishing and quishing—are designed to exploit human trust, not technical flaws. And they’re working. Protecting users from falling for such schemes is difficult. Threat researchers have seen malicious smishing c...
June 27, 2025
Organizer:
FedInsider Location:
Webcast
Ethical Hacking Dual Certification Boot...
CANCELED
Delve into the tools and techniques used by cybercriminals over five days. Gain in-depth training in ethical hacking methodologies through lectures and hands-on labs. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation and data exfiltration. You’ll gain two highly sought-after certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+. These certifica...
June 23-27, 2025
Organizer:
Infosec Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.