Meeting the Quantum Deadline: Migrating...
According to OMB M-23-02, agencies are directed to submit a prioritized inventory of information systems and assets, excluding national security systems, that contain CRQC-vulnerable cryptographic systems to ONCD and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA). No later than 30 days after the submission of each annual inventory of cryptographic systems required under Section II of this memorandu...
Empowering Public Sector Cybersecurity:...
The Executive Order on improving the nation's cybersecurity (EO14028) outlines several standards and requirements that government must meet to foster a more secure cyberspace. With endpoint security and event logging unified on a single FedRAMP cloud platform, Elastic and MAD Security effectively address the cybersecurity challenges ready to help agencies meet and exceed EO requirements with an affordable infrastructure model that keeps all ag...
Strategic Guidance On Solving M-24-04
M-24-04 requires that federal agencies must have a clear understanding of the devices connected within their information systems to gauge cybersecurity risk to their missions and operations. However, with today’s heavily complex environments this action requires a level of expertise and precision that poses its own set of challenges. To that end, Asc3nd Technologies Group, the premier federal partner in IoT and OT security, invites you t...
Unlocking Healthcare IT Success: Solvin...
This webinar is a part of Carahsoft's HIMSS 2024 Webinar Series exploring how to create tomorrow's health. In this on-demand webinar, SolarWinds Healthcare and Database experts dove into: Critical challenges confronting healthcare organizations and strategies for addressing patient and media scrutiny Essential techniques for enhancing database and IT infrastructure management, including leveraging observability tools and eliminating tool spra...
Dragos WorldView Threat Intelligence: P...
In a rapidly evolving and dangerous cyber landscape, threat intel is essential to keep an organization secure. Detecting threats to Industrial Control/Operational Technology (ICS/OT) systems is difficult, which is why Dragos has organized the industry’s largest and most experienced team of ICS cybersecurity practitioners. During this webinar, attendees learned how Dragos WorldView Threat Intelligence arms organizations with in-depth visi...
Resilience Unleased: The Case for Devel...
During this webinar, attendees got to meet Synack, the premier security testing platform that offers Penetration Testing as a Service (PTaas) on its FedRAMP Moderate Authorized Platform. Synack enables federal, state and local government customers to increase cyber resilience, allowing them to find their most critical vulnerabilities and track improvements over time. During our complementary Synack webinar, attendees learned about: The Case fo...
Third Party Risk Management Handled Webinar
During this webinar, we discussed: What all the AI chatter really means - what's possible, what's not, and who should care Whether AI poses an existential cybersecurity threat and how to protect against it How to use today's AI effectively and responsibly - and how to plan for what's next Register to view this on-demand recording.
Innovations in Cybersecurity Training f...
Cyber workforce development has never been more essential in the public sector space. With cyber threats on the rise, upskilling employees and filling security positions is critical. Per the National Cybersecurity Strategy, updated in 2023, workforce development training is a directive moving forward. During this webinar, attendees: Learned how OffSec’s proven methodology can help improve your security posture Explored new and innovative...
The Path to Successful CMMC: Expert Ins...
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing the requirements of CMMC, unpacking the layers and levels of cybersecurity preparedness it demands, and bringing their real-world experience to the table. Invaluable insights into the strategic and tactical steps companies must undertake to navigate their compliance journey successfully were s...
Briefing on the Rocks with OpenText
Attendees had a chance to connect and learn more about OpenText and OpenText Cybersecurity products and how to stay viligent against cyberattacks.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.