Back to Search Begin New Search Save Search Auto-Notify
WEBINAR: How to Ensure CONFIDENTIALITY,...
All enterprises, large and small, need to meet regulatory compliance by employing encryption. However, effective management of encryption keys is not simple. In a recent nCipher/Ponemon encryption study, 60% of respondents reported that key management is “very painful.” Implementing an infrastructure that ensures Confidentiality, Integrity, and Availability (C.I.A.) of data through encryption management that can be centrally contro...
July 9, 2020
Organizer: Fornetix
Location: Webcast
Add Favorite
Quantum Cyber Webinar
Quantum computing offers a more sophisticated computing model that has significantly increased computer power, is faster, and will lend itself to a Quantum-Smart workforce. Do you want your data to be safe and protected in ten or twenty years from now? Would you like a faster computing process in place to prevent attacks on data? Will Quantum computer threaten the current encryption infrastructure? What are the plans for using Quantum in the p...
June 24, 2020
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Quantum Cyber Forum
To protect the health and safety of attendees, this event has been postponed due to COVID-19 concerns. Quantum computing offers a more sophisticated computing model that has significantly increased computer power, is faster, and will lend itself to a Quantum-Smart workforce. Do you want your data to be safe and protected in ten or twenty years from now? Would you like a faster computing process in place to prevent attacks on data? Will Quantum...
April 16, 2020
Organizer: ACT-IAC
Location: Washington, DC
Add Favorite
MetaAccess: Next Generation Network Acc...
Agencies are increasingly challenged by the proliferation of risky, unmanaged devices in the age of bring-your-own-device in the workplace. Fortunately, there is a surprisingly simple way to tame all those potentially rogue devices with industry-leading endpoint security and advanced threat prevention technologies. OPSWAT MetaAccess empowers organizations to enforce internal security standards, meet security, and regulate compliance across all...
November 7, 2019
Organizer: OPSWAT Government Team at Carahsoft
Location: Webcast
Add Favorite
Encryption Export Controls 2019 Edition...
US export controls on hardware and software using encryption remain one of the areas that can confound even the most experienced export compliance practitioner. This webinar will go through the basics of classifying items that could fall within Category 5 Part II of the Commerce Control List. We will also review export licensing requirements for these items, including NLR and License Exception ENC. Designed for individuals with a working knowl...
October 8, 2019
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Cybersecurity Technical Excellence Event
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
July 31 - August 2, 2019
Organizer: Corporate Compliance Seminars
Location: Denver, CO
Add Favorite
Cybersecurity Webinar with FedTek and Thales
Join us for a complimentary webcast on June 27th to learn how FedTek partnered with Thales eSecurity Federal and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solution to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file level access controls, encryption,...
June 27, 2019
Organizer: FedTek
Location: Webcast
Add Favorite
Protecting Sensitive and Compliant Anal...
Big data collects and analyzes large amounts of data from heterogeneous sources to discover unprecedented new knowledge and understanding of scientific and business scenarios. Aiming to gain greater insight into patterns not generally discernible from smaller data sets, big data business intelligence enables visibility into associations and trends that otherwise go unnoticed.However, big data exposes the enterprise to numerous data security th...
June 20, 2019
Organizer: Thales Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Cybersecurity Technical Excellence Event
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
June 5-7, 2019
Organizer: Corporate Compliance Seminars
Location: Woodland Hills, CA
Add Favorite
Stopping DNSpionage In Its Tracks: An A...
The international Domain Name System isn't just infrastructure. It works hand-in- hand with SSL/TLS-based authentication and encryption systems to provide a foundation of trust and privacy across the internet.Earlier this year, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency detected an ongoing threat to federal agencies and issued the Emergency Directive 19-01. The attacks compromised DNS records and cre...
June 6, 2019
Organizer: Venafi Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search