Anchore VIPERR Workshop
Developing concrete processes and controls to secure your organization's software supply chain can absorb massive amounts of time and resources without guaranteeing significant security improvements. Enter VIPERR, an actionable software supply chain security framework developed by Anchore, synthesizing lessons learned from supporting the most challenging software supply chains across government agencies and the defense industrial base. Join An...
F5 BIG-IP Next - Explore the Next Gener...
Join F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next. What you will learn: We invite all BIG-IP users to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees will receive a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use case...
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
Steering Through Complexity: Grasping C...
Join Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRIM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. Delve into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 2.A and the OMB Memo-CISA Attestation Form....
5 Easy Wins to Achieving Zero Trust in...
Orca Security, in collaboration with GuidePoint Security invite you to this insightful webinar on June 18, 2024. Listen in as Neil Carpenter, Elizabeth Sims and Chris Romero delve into the challenges and solutions for achieving Zero Trust in the cloud. Hear insights revolving across the key pillars: Data Automation and Orchestration Governance Identities and Entitlements Application and Workload
Why MDR Requires a Holistic, Cost-Effic...
Join us for a panel discussion with Splunk and Alchemy Security around the real need for managed security services and the power of Splunk to drive your cybersecurity and threat detection strategies. During this session, the panelists will discuss the challenges with black-box MDR providers and why adopting transparent, holistic solutions are the preferred answer for highly targeted, public-sector organizations. Join this webinar to gain insig...
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web. Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabili...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.