Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
DoDIIS 2022 Webinar Series: Cybersecuri...
During Ivanti's webinar session, attendees explored: How to deal with the new mandates (OBM 22-09, EO 14028, BOD 23-01) IT Modernization Specific threats towards the DoD Register for this on-demand webcast today!
Add Favorite
How to Prepare for CMMC Mandate
RegScale and Carahsoft hosted this webinar to help you and your cybersecurity team prepare for DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. Under the CMMC program, all Defense Industrial Base (DIB) contractors will be required to implement certain cybersecurity protection standards and perform self-assessments or obtain third-party certification as a condition of DoD contract award to better protect controlle...
Add Favorite
Taking Advantage of Cloud Mandates to R...
Agencies are continually asked to reduce spending while facing new directives to upgrade their enterprise systems. For instance, M-19-21 directs all federal agencies to digitize their hardcopy records. Meanwhile, Executive Order 14028 requires agencies to move to the cloud and increase their data security capabilities, such as multi-factor authorization, sensitive data encryption, and the conversion of all legacy applications to a zero-trust d...
Add Favorite
Security Programs that Thrive in Econom...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this pr...
Add Favorite
Oracle Cybersecurity Webinar Series
What does cybersecurity encompass? This can range from various pieces that comprise the overarching thought of cybersecurity. Oracle's portfolio of solutions provide assistance to federal customers with efficiency and security. Ransomware is one of the highest risks for any data-driven organization. Besides reducing the chances of an attack, agencies also need to evaluate data compromise and extraction, as well as post-attack recovery. This se...
Add Favorite
CrowdStrike Customer Story - Maine 207
In 2021 there was an 82% increase in ransomware-related data leaks and over 170 adversary groups being tracked for their cyber activity. Every organization is at risk, and due to the data-rich environment, K-12 school districts are considered high-value mines for ransomware groups. Our K-12 meeting featured Don Ringelestein from Maine Township High School District 207, as he explained what to look for in your cybersecurity solution journey and...
Add Favorite
Inside the New Mobile Mandates: Your Bl...
The new cybersecurity targets based on the Executive Orders, OMB Memos and CISA Directives all lead to a requirement for mobile devices to be tracked as endpoints, and mobile applications to be security tested for protection against malicious coding, geotracking, PII/PHI misuse, and government data loss. Whether you are managing existing mobile apps or building your own, the new cybersecurity directives are elevating the need to obtain a Conti...
Add Favorite
How to Improve Your Cybersecurity Readi...
With cyber threats increasing in volume and sophistication, effective and agile privileged access management (PAM) is now crucial for educational institutes. Best-in-class centralized privilege management enables institutes to establish an agile framework for Zero Trust access today and tomorrow, regardless of operating system (OS) or domain. During this on-demand webinar, attendees learned: How to balance productivity and security Why increas...
Add Favorite
Oracle Cybersecurity Webinar Series
What does cybersecurity encompass? This can range from various pieces that comprise the overarching thought of cybersecurity. Oracle's portfolio of solutions provide assistance to federal customers with efficiency and security. Is your agency prepared to recover from data loss due to a ransomware attack? Today's enterprise applications work constantly, yet the sensitive data they hold only backs up once a day, creating a risky situation that c...
Add Favorite
Protecting Academia - Securing Students...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them for an informative presentation on how to protect yourself and your organization from phishing attacks. Our expert speaker, James Stroud, Senior Sales Engineering Manager at Proofpoint, will cover the basics of phishing, the consequences of falling for a phishing attack, and best practices for protecting against them. Attendees in this on-demand webinar lea...
Add Favorite
Back to Search Begin New Search