Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. This webinar explored the intricate and powerful combination of Zero Trust and insider risk management! During the session, our speakers:Identified challenges and solution...
Add Favorite
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about:Regulations and industry standards driving cybersecurity efforts in the public se...
Add Favorite
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Attendees explored how Synopsys can help teams navigate the requirements of EO 2024-011 by securing critical applications. Stream the webinar to lea...
Add Favorite
Shielding Helpdesk Operations Against S...
The Scattered Spider attack on MGM represented a significant breach in cybersecurity measures, disrupting the company’s services and jeopardizing customer data, all from a call into the helpdesk. The breach illustrated an identity gap in identity and access management, highlighting the significance of Caller ID Verification in fortifying helpdesk security protocols. This attack has shown the impact of an inability to ensure the identity...
Add Favorite
Unlocking the Potential of AI & Data Sc...
The US government has initiated various AI/ML programs, emphasizing the strategic importance of customer experience (CX), including AI Legislation and Executive Orders (EO) like EO 14058. The impact of AI resonates across multiple crucial government sectors, from National Security and Health & Human Services to Commerce, Energy, Law Enforcement, Public Authority/Utility and Transportation. The adoption of AI doesn't come without challenges...
Add Favorite
Navigating Modern Data Protection ...
In today's modern landscape, there is a growing need for robust data loss prevention (DLP) solutions to protect sensitive data and ensure compliance with data privacy regulations. In this webinar, Symantec takes an in-depth look at the evolving cybersecurity threats to organizational data and actionable data protection strategies.Attendees learned:The challenges educational organizations are facing and the importance of applying data protectio...
Add Favorite
Modernizing Government Software Develop...
In today's digital landscape, federal civilian agencies face constant pressure to innovate while safeguarding sensitive data and critical systems. Keeping pace with rapid software development and robust cybersecurity can be challenging. GitLab, in collaboration with AWS, empowers agencies with AI-driven Secure Software Development Lifecycle (Secure by Design). This cutting-edge approach ensures a secure and efficient software development proce...
Add Favorite
Fortifying the Frontlines: Mastering Cy...
As cyber threats continue to evolve, so does the need for a sophisticated approach to managing the cybersecurity workforce and ensuring compliance within DoD and federal agencies. This webinar explores how DefenseReady by Permuta provides integrated solutions that not only streamline workforce management but also enforce rigorous security protocols, ensuring that your agency remains both effective and compliant in a landscape of increasing cyb...
Add Favorite
Best Defense is a Great Offense: Integr...
Federal agencies face an ever-evolving landscape of cybersecurity threats that require dynamic and robust response mechanisms. To stay ahead of bad actors, agencies need to automate the detection, prioritization, and remediation of vulnerabilities in real-time. Continuous authorization and monitoring is also critical to a proactive approach to cybersecurity that aligns with the Federal Risk and Authorization Management Program (FedRAMP) and ot...
Add Favorite
OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
Add Favorite
Back to Search Begin New Search