Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
A New Paradigm for Managing Third-Party...
The MOVEit and GoAnywhere attacks in 2023 ushered to the forefront the importance of having a viable and adaptive third-party risk strategy. If there had ever been the feeling that third-party risk was a secondary stakeholder in the cybersecurity space, the importance of which was elevated only for short periods of time during a crisis, these two attacks shattered that notion entirely. This new reality has compelled security strategists to rap...
Add Favorite
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Add Favorite
Automated Policy Enforcement for CMMC w...
CMMC is an important program for hardening the cybersecurity posture of the defense industrial base, yet implementation can be a challenge for teams unfamiliar with automating compliance measures. Attendees joined Anchore experts on August 27th for a webinar that explored the evolving areas of CMMC and SSDF compliance parameters. During this webinar, we demonstrated how Anchore Enterprise can help your agency:Implement and automate compliance...
Add Favorite
Carahsoft's CMMC Webinar Series - CMMC...
Wiz and Carahost hosted a webinar which covered an introduction to Cloud Native Application Protection Platform (CNAPP) and alignment with key CMMC controls. In this webinar we covered:The importance of DIB cybersecurity and safeguarding cloud workloads supporting the DIB, government agencies and warfightersBridging the divide between DIB security professionals and software developersWiz mapping & alignment with the key CMMC controls Minim...
Add Favorite
Meet the Presidential Cybersecurity Man...
Watch this on-demand webinar designed to empower federal agencies to achieve the cybersecurity goals outlined in the latest presidential mandate. Discover how RSA's newly FIDO2-certified authenticator app can transform your agency's security infrastructure. Learn how the RSA authenticator app can help federal and other government agencies defend and modernize key infrastructures, enhance and scale collaboration between public and private secto...
Add Favorite
Achieving CMMC Compliance: Ensuring Dat...
Thank you for your interest in our Rubrik CMMC webinar: Achieving CMMC Compliance: Ensuring Data Protection & Cyber Resilience with Rubrik Attendees of this webinar heard from Bill Hackley, Federal Sales Engineering Manager at Rubrik, about the essential aspects of CMMC compliance and how Rubrik can help organizations meet CMMC standards through:Advanced data protectionData managementEnhancement of cybersecurity measures
Add Favorite
Empowering Federal Cybersecurity: Imple...
Attendees joined OffSec for a webinar to learn how implementing skills-based hiring for cybersecurity roles in the federal government poses several challenges. First, there's the issue of standardizing assessment methods across agencies. Unlike traditional practices relying on education and experience, skills-based hiring requires reliable tools like simulations and practical tests to assess competencies accurately. Ensuring uniformity across...
Add Favorite
Safeguarding State, Local and National...
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your security posture and how Proofpoint’s state-of-the-art impersonation protection can be a key component in this effort.Thank you for joining us...
Add Favorite
TDTM: Enhancing Federal Data Security:...
This webinar was designed for federal IT professionals seeking to move beyond conventional backup solutions and adopt comprehensive cyber resilience frameworks. Our experts covered topics such as immutable data, AI-driven threat detection, and rapid, secure recovery processes.Attendees learned about:Insights into the limitations of traditional backup methods.Techniques for integrating cybersecurity with data protection.Strategies for implement...
Add Favorite
Building Student-Led SOCs in Higher Education
Higher Education Security Teams are often understaffed, underfunded, and at greater risk for cybersecurity threats. While many schools recognize the potential of student internships from their Cybersecurity programs, they often struggle with the management and training required to integrate these students into their Security Teams. This webinar showcased how LSU formalized its Student Led SOC program to create a framework that trains students...
Add Favorite
Back to Search Begin New Search