Optimizing Cyber Readiness in Federal A...
The Cyber Operational Readiness Assessment (CORA) is crucial for evaluating and enhancing cybersecurity and mission resilience within Defense and Intelligence agencies. Integrating vast volumes of security, risk, and mission data into actionable insights demands continuous, real-time monitoring. This session showcased how the ServiceNow AI platform, utilizing Security Operations (SecOps) and Integrated Risk Management (IRM), offers federal age...
OT Security for Tribal Governments: Pro...
Tribal governments oversee a diverse mix of critical systems — from water treatment plants and healthcare facilities to casinos and education networks. This unique combination makes them an ideal target for cybercriminals because they face tight budgets, limited cybersecurity resources, and high visibility within their communities. Even small attacks can cause significant disruption and gain unwanted publicity. Attendees joined us to lea...
Agentic AI workshop: Train your first c...
Think AI model training is only for data scientists? Think again. Join this free hands-on workshop where you'll train and fine-tune a real cybersecurity model — no advanced math or data science degree required. As a cybersecurity professional, you should be training AI models. Your expertise is exactly what's needed to build effective AI-powered defenses. In this 90-minute, interactive session, you’ll learn some of the same skills...
Beyond MDBR: Why SLED Organizations are...
MS-ISAC’s free Protective DNS (MDBR) ended on October 1. With funding discontinued, the need to act is urgent. But this moment presents more than just a replacement decision; it’s an opportunity to upgrade this critical layer of cyber defense. Infoblox Threat Defense is the mature, best-in-class alternative, trusted by Federal and SLED organizations to deliver proactive, intelligent and resilient DNS-layer security. It ensures comp...
CMMC Compliance On-Prem: Leveraging Pri...
Attendees joined us for a CMMC strategy session designed for agencies seeking to streamline their path to compliance. Our panel of cybersecurity and compliance experts shared real-world strategies, best practices, and actionable insights that helped participants achieve and maintain efficient and cost-effective compliance. The session highlighted how to transform compliance from a challenge into a competitive advantage. Attendees learned how t...
Bank of America and RADICL: Your CMMC Partner
Watch our webinar, Bank of America and RADICL: Your CMMC Partner, to learn everything you need to know about the Cybersecurity Maturity Model Certification (CMMC), effective from December 16, 2024. This essential framework includes 17 requirements for Federal Contract Information (FCI) and 110 for Controlled Unclassified Information (CUI). Why Attend? Compliance with CMMC is crucial for securing DoD contracts and protecting against threats and...
Modern Application Security in the Fede...
During the opening session of the Federal Application Security Webinar Series, experts unpacked how evolving Federal mandates and the rise of AI-assisted coding are reshaping software assurance. Federal agencies are under growing pressure to modernize securely while meeting evolving cybersecurity mandates. With AI now influencing how software is built, tested and deployed, agencies face new opportunities and risks. During this webinar, attende...
From DISA STIGs to C2C and CORA: How to...
The Department of War faces significant challenges when it comes to adhering to complex reporting requirements whilst defending their networks against sophisticated adversaries. They require automation and network visibility that enables them to:Achieve compliance: Ensure continuous alignment with DoW cybersecurity programs (C2C, CORA) through automated compliance assessments (STIG, Zero Trust).Reduce network risk: Identify, prioritize, and re...
Compliance in the Cloud: FedRAMP Modera...
CMMC is here and most new Department of Defense/War contracts will have this requirement within. For CMMC Registered Practitioners (RPs), this significant milestone marks a pivotal shift from advisory preparation to operational execution and monumental opportunity to support assessment readiness for government contractors.This webinar will provide practical insights into how critical SaaS solutions such as Deltek’s Costpoint GovCon Cloud...
DNS: The Blind Spot in Federal Cybersecurity
"Traffic for DNS lookups often goes largely unmonitored by many security tools. Whereas web and email traffic are often closely scrutinized, DNS traffic largely represents a blind spot for such defenses." Sound familiar? In today’s evolving threat landscape, adversaries are exploiting this overlooked protocol to infiltrate federal networks, embedding malware in DNS TXT records and bypassing traditional defenses. Even sophisticated agenci...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.