Splunk Call To Action: White House Urge...
Please join us to learn more about how Splunk can help you better protect your organization against potential cyberattacks in response to the White House issued statement by President Biden and accompanying fact sheet. These were released warning companies to "accelerate our work to improve domestic cybersecurity and bolster our national resilience" as Russia looks to potentially leverage cybersecurity exploits against western countries. In ad...
How to Access ARPA and IIJA Funding to...
You're invited to join NetWitness and Carahsoft for a webinar all about these new grant programs and how to best utilize them for your agency. Members of the Grants Office will also be present to answer your application questions. In this webinar, you will learn: How to upgrade your holistic threat intelligence capabilities and access powerful security insights with grant funding All about how rapid end-to-end visibility up-levels your agency'...
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Hardening the Cyber Quiver
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
Fireside Chat: Aligning ICAM, the Execu...
In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term "Zero Trust" from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify,...
Balancing Global Collaboration with Inf...
archTIS is pleased to invite you to attend our live event on “Balancing Global Collaboration with Information Security: Best Practices for Tackling Defense and Supply Challenges” on Thursday, May 5, 2022. Close collaboration with allies and partners, supply chain and seamless communication, war gaming (i.e. Project Convergence, Overmatch, etc.) and research all require secure information access and sharing to be successful. Program...
Maximizing State and Local FYE Spend -...
During this webinar, attendees will learn: Key funding priorities that state and local IT teams should consider at the fiscal year end Which federal funding vehicles to tap for cybersecurity investments Importance of investing in IT solutions such as Riverbed’s scalable unified observability platform that improve visibility across hybrid network environments What solutions will help you hunt for cybersecurity threats originating from ...
Lessons Learned and the New Normal: Com...
With the impact of the pandemic and a constantly changing threat landscape, educational institutions from K-12 to college and university levels face the task of effectively reducing cyber threats for their students. Learning environments fluctuate between fully remote, fully back in school, and hybrid. How do we enable and enhance cybersecurity with this ever-changing attack surface? Join Infoblox and NetSync for an interactive session on how...
Log4Shell Exploit Explained
Join us as RangeForce's Director of Sales Engineering, Tanner Howell, walks us through a hands-on training module around the Log4Shell exploit. You will learn how the exploit works, see how it is applied to a vulnerable service, and see how to detect and mitigate the vulnerability. RangeForce is a hands-on cybersecurity upskilling platform covering nearly every cybersecurity topic from incident response, to secure programming, to advanced pene...
Closing Federal Agency IT/OT Visibility Gaps
Many federal agencies are experiencing a "visualization gap" where IT and security leaders can't see all the vulnerable assets within their environment or understand the full extent of their IP addressable asset inventories. This is due to the increasing amount of unmanaged and undermanaged devices that are barely visible, typically only by IP address. Join Armis, ShorePoint, and Carahsoft for this complimentary webinar to discuss why total as...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.