Achieving Cyber Resiliency: A Roadmap t...
It is projected that by 2031, ransomware attacks will occur every two seconds and cause $265 billion in damages. As ransomware attacks, data breaches, and phishing tactics become increasingly prevalent in the cyber landscape, Federal agencies must take proper steps to reduce the attack surface and protect valuable data. What does the roadmap for agencies look like? Join MeriTalk and Cohesity for the “Achieving Cyber Resiliency: A Roadmap...
March 22, 2022
Organizer:
MeriTalk Location:
Webcast
Veritas HIMSS Theater Sessions 2022
Ransomware attacks on healthcare and critical infrastructure are up 311% from last year. The most recent forms of ransomware actually exfiltrate the data causing a reportable breach under HIPAA. As a result, healthcare disruptions cost millions to remediate, cybersecurity insurance costs have tripled, and patients are 8% more likely to die if being treated during an attack. Leading healthcare organizations focus on Ransomware resiliency, not j...
FCW Summit: Cybersecurity
Most people in government would confirm that cybersecurity is their #1 priority right now. A hybrid work environment with its enlarged attack surface and a continuing escalation in the number and sophistication of attacks put the systems and the data that resides on them at an uncomfortable level of risk. The administration is providing new policy guidance with an executive order on cybersecurity that emphasizes Zero Trust architecture, new gu...
March 16, 2022
Organizer:
GovExec Location:
Virtual Summit, DC
Zero Trust Architecture Needs Data Mana...
The Cybersecurity Executive Order released in May 2021 uses the word “data” more than two dozen times, referring to both data generated by the mandated cybersecurity measures and the government’s data more broadly. This increases the requirements for agencies to identify, classify, manage, and protect all their data, with particular emphasis on sensitive data. This webinar will feature thought leaders from government and indu...
March 15, 2022
Organizer:
FEDINSIDER Location:
Webcast
Zeroing in on Devices: 2022 Federal Zer...
While agencies strive to meet changing zero trust requirements, which of OMB’s security pillars (identity, device, network, application, and data) are taking precedence and which are falling behind? MeriTalk and Merlin Cyber surveyed more than 150 Federal cybersecurity executives to explore momentum, priorities, and challenges around the evolution to zero trust. More agencies see challenges in reaching optimal maturity for device than an...
March 15, 2022
Organizer:
MeriTalk Location:
Webcast
Secure Video Distribution in a Zero Tru...
Securing video distribution systems (VDS) is critical in a zero trust (ZT) world. Modern warfare concepts, such as JADC2, ABMS, project convergence and project over match are all about information dominance. Video and audio data are the virtual eyes and ears of mission critical command and control centers, combat information centers, briefing rooms and operations centers. This webinar is a must for anyone involved in securing VDS platforms. Le...
Implement the New NIST Risk Management...
Registration Closed The new Presidential Executive Order has increased emphasis on advancing toward “Zero-Trust Architecture” and “Endpoint Detection and Response (EDR)”, and moving systems to FedRAMP clouds. Additionally, NIST has released the finals of many Risk Management Framework (RMF) standards (SP800-53 Rev 5 – Security Controls, SP800-53B – Security Control Baselines, Privacy Framework, SP800-160 Vol...
Disrupting Cyberattacks with Zero Trust...
The increasing complexity of government networks has opened new paths for adversaries to launch cyberattacks. Modern assets, converged environments, complex operating environments, and sophisticated access management procedures have led to a new breed of attack vectors spanning across multiple dimensions, including IT, OT, identities and cloud applications. To address these new realities, agencies are rolling out Zero Trust architectures. As p...
March 3, 2022
Organizer:
ATARC Location:
Webcast
CyberScape Series: ID
Faced with an executive order to improve cybersecurity, agencies are introducing processes to protect their systems and networks. Amid an evolving technology landscape that incorporates more virtual and cloud environments, application development and data access off premises, securing these systems to prevent unwanted breaches is mandatory. Leaders discuss strategies in zero trust, identity access management and more to bring cybersecurity app...
Zimperium- The Evolution of BYOD and En...
Microsoft Office 365 has been the primary enterprise productivity suite for years, launching on traditional endpoints and eventually moving to mobile devices. Now, during this distributed workforce era where employers and employees are more reliant on mobile, more corporate data is transferred through Outlook and Teams, opening the door to intellectual property and PII on mobile endpoints than ever before. But despite having access to much of...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.