Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
Add Favorite
Cybersecurity At The Frontlines: SLED C...
State, local, tribal and educational institutions operate at the intersection of high public impact and limited cybersecurity resources. Despite constrained budgets, talent shortages, and an expanding digital threat landscape, SLED CISOs are finding innovative ways to secure critical infrastructure, protect citizen data, and enable resilient services. In this SentinelOne and RNSC Technologies webinar, experienced CISOs shared how they’re...
Add Favorite
Advancing Military and Veteran Health I...
Military and Veteran Health IT leaders face unique security challenges requiring robust and flexible solutions. During this webinar, Zscaler spotlighted Trusted Internet Connections (TIC) 3.0 and its pivotal role in strengthening security while enabling seamless interagency collaboration. Attendees gained insights into implementation strategies and compliance requirements that align with the dynamic needs of the Federal health community. What...
Add Favorite
Learn How to Achieve CMMC Compliance wh...
Ariento was a leading provider of managed, consulting, and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification demonstrated their commitment to their managed service clients and assisted in making their certification assessments easier and more cost effective. On Tuesday, October 21 from 1:00 – 1:30 pm, BeyondTrust’s Kevin...
Add Favorite
CMMC Better Together Webinar Series: Sh...
Carahsoft and our partners came together to host our 2025 CMMC “Better Together” Webinar Series: Shared Responsibility for Sustainable Compliance. The goal of this series was to bring together leading integrated solutions providers to explore how collaborative, end-to-end strategies can help members of the U.S. Defense Industrial Base (DIB) achieve and sustain compliance with the Department of Defense’s Cybersecurity Maturity...
Add Favorite
Vulnerability Management 101
During this on-demand webinar attendees learned:The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CKHow vulnerability management plays a role with various standards and frameworks
Add Favorite
Implications of the Proposed National Q...
The Senate recently introduced bipartisan legislation that could accelerate the nation’s migration to post-quantum cryptography (PQC). Known as the National Quantum Cybersecurity Strategy Act, the bill reflects growing federal urgency to prepare for the cybersecurity risks posed by quantum computing and highlights a critical reality: today’s stolen data won’t stay secure forever. For public sector agencies, this legislation r...
Add Favorite
Mission FedRAMP High: Fast-Tracking Zer...
Federal agencies face unprecedented cybersecurity challenges driven by evolving threats, compliance pressures, and budget constraints. Agencies shouldn’t have to juggle extra solutions, contracts, or overhead just to comply with EO 14028, OMB M-22-09, and the DoD Zero-Trust Strategy. To navigate these complexities, agencies are turning to integrated solutions that streamline Privileged Access Management (PAM) and elevate compliance to Fe...
Add Favorite
Mission Assurance is Software Assurance
Thank you for your interest in our mission-focused webinar on software assurance and secure delivery.The Department of Defense is doubling down on requirements for SBOM generation, ATO and SWFT, pushing teams to meet higher standards for securing mission-critical systems. Many legacy tools are falling short—offering limited automation, visibility and compliance support.During the webinar, cybersecurity leaders from ReversingLabs shared h...
Add Favorite
Securing Federal Access: Identity Secur...
As government agencies continue to modernize their IT infrastructure and align with executive mandates for Zero Trust Architecture (ZTA), identity security becomes a critical pillar for cyber resilience. This webinar, hosted by BeyondTrust and Optiv + ClearShark, explored how government agencies can formalize and accelerate their zero trust implementation with Identity Security Insights that illuminate exposures in their identity security post...
Add Favorite
Back to Search Begin New Search