Revolutionizing Endpoint Security ...
As a trusted partner and valued federal customer, your security requirements have always been at the forefront of our innovations. We are excited to showcase how BigFix 11 can empower your agency to proactively safeguard critical assets and infrastructure against the ever-evolving threat landscape. During this session, HCLSoftware will unveil the latest security enhancements of our endpoint management platform and demonstrate how BigFix can em...
2023 CyberMaryland Governance and Polic...
Governance & Policy Forum Overview As part of the annual CyberMaryland Conference, the Federal Business Council, Inc. will host a CyberMaryland Forum at the Dreamport Mission Accelerator in Columbia, MD in March. CyberMaryland events connect the best of academia, government, and private industry organizations to ensure the cyber-safety of today and educate the cybersecurity professionals of tomorrow. Additionally, they provide an opportuni...
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
Déjà Vu All Over Again: How to Prepare...
Because of recent Common Vulnerabilities and Exposures (CVE) announcements like Apache Log4j, software teams have been upended all over the world. This results in scheduled work coming to a grinding halt, and triage and emergency “surgery” being performed on applications. If not prepared, productivity can be derailed for weeks or even months. The longer it takes, the more pressure is applied by management. You're invited... Please...
Zimperium- The State of Mobile Payment...
As widespread worldwide adoption of smartphones continues, and as global consumers conduct an increasing proportion of their shopping online due to the restrictions imposed by the last two plus years of a global pandemic, mobile transactions have skyrocketed. Yet, two years ago just prior to the first outbreaks of COVID-19, the Pew Charitable Trusts published research that suggested distrust and avoidance of mobile payments was common due, pri...
Zimperium- The Global Mobile Threat Rep...
As the worldwide leader in mobile threat defense (MTD), Zimperium protects millions of mobile devices and apps. As a result, we have unmatched forensic data about mobile device, network, phishing, and app risks and attacks. After analyzing the full breadth of our 2021 anonymized data, we’ve gleaned unique insights on the state of mobile security that we’re sharing in our Global Mobile Threat Report. On the heels of the release of t...
Zimperium- Top 5 Risks to Address in th...
Even though there are similarities on how web and mobile apps are used, the risks that mobile apps can pose to an enterprise are fundamentally different. Some risks arise during development and others once the application is published. With multiple solutions needed at different points in the application life cycle, DevSecOps professionals find themselves wondering where to begin and which stages of the software development lifecycle they shou...
35th Anniversary Police Security Expo
To protect the health and safety of attendees, this event has been rescheduled due to COVID-19 concerns. New Dates: 8/24-8/25/2021 Products, Services and the latest Technological Advances needed by Law Enforcement, Security, First Responders and Government Industry Professionals to make them safer and more effective on the job.
Zimperium: How to Protect Your Enterpri...
How to Protect Your Enterprise Against the Pegasus Attack Best practices from detecting & defeating the spyware since 2016 August 5, 202111am EDT / 4pm UTC+130 Minutes According to recent reports, mobile devices of 50,000 individuals from 50 countries have been under attack by a new variation of an aggressive mobile spyware known as Pegasus. Enterprise security professionals need to know how to protect their mobile endpoints, and ultimatel...
Intangibles when Building out your DevS...
Hear from your peers during this interactive panel discussion! Application Security (AppSec) programs are critical to preventing costly and damaging breaches or cyberattacks – especially in government and education sectors where private information is abundant. But setting up an AppSec program isn’t as easy as checking boxes and installing a new scanning tool; it’s a journey that entails security-minded messaging from the to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.