Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Manageable Zero Trust for OT Networks
Check out our on-demand recording of Waterfall Security Solutions and Carahsoft as we discussed how the modern approach to OT cybersecurity initiatives employs both zero-trust architectures and micro-segmentation and how applying these modern concepts to OT networks can be challenging. Attendees of this webinar also learned that OT security programs focus on: Protecting the safety of personnel Reliability of industrial production Physical pre...
Add Favorite
Cloud Security Strategies: Explore the...
Organisations can be compromised and experience data breaches due to an ineffective cybersecurity strategy. In this session, Tim Rains, Amazon Web Services (AWS) EMEA Regional Leader for Security & Compliance, will inspect popular enterprise cybersecurity strategies and explain why sometimes they fail to protect. Learn how to measure the effectiveness of any cybersecurity strategy, how this should influence your IT roadmap, and how the clo...
Add Favorite
Breaking Intrusion Kill Chains with AWS
Many cyber-attacks employ a repeatable process called the ‘intrusion kill chain’ to identify targets, weaknesses, potential exploits, and use them to victimize organizations. It’s how an attacker ultimately gains access to protected data to steal it, encrypt it, and/or destroy it. Pioneered by Lockheed Martin, anti-kill chain strategies are helping Chief Information Security Officers (CISOs) and cybersecurity practitioners ac...
Add Favorite
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. View this two part...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Google Cloud and Carahsoft invite you to a webinar to learn more about cybersecurity solutions and demonstrate specific use cases. Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to det...
Add Favorite
Cofense's Security Trends: 2020 and Beyond
Join us as Cofense security expert, Andy Spencer, shares the latest insights on which phishing and malware threats you should be prepared for and ready to combat. As the threat landscape continues to evolve at a rapid pace, with new threat vectors emerging and increasing in sophistication, Andy will share a more in-depth perspective of what to expect through the remainder of 2020 and beyond. Between the Cofense research teams and their Phishin...
Add Favorite
Provide Zero Trust Architecture in a Hy...
State and local governments are highly vulnerable to cyber-attacks. With an increase in telework environments, agencies have been forced to rethink their cybersecurity approach. Determining the right security solution can become quite complex for state governments with the amount of vendors on the market - along with the lack of staff and limited funding. Fortunately, an intrinsic security approach simplifies your security strategy by building...
Add Favorite
Turning on the Light in Supply Chain Il...
In an ever-changing geopolitical landscape, understanding your global supply chain and finding inherent risks at speed and scale has never mattered more. View our on-demand webinar to gain an insider’s view on how to identify supply chain issues, quickly comprehend them, and accelerate mission-critical decisions. In our session, we share practical guidance to help you transform your Supply Chain Risk Management (SCRM) from theoretical to...
Add Favorite
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Add Favorite
MF Compliance with Splunk: Continuous M...
The Risk Management Framework (RMF) was introduced to help federal agencies better manage the many risks correlated with operating an information system. Splunk offers a flexible, cost-efficient, and integrated solution to allow agencies to meet their RMF compliance requirements. NIST Special Publication 800-53 is the set of security and privacy controls designed to protect organizations from cybersecurity risks that are the result of an ever-...
Add Favorite
Back to Search Begin New Search