Adopt a More Human-Centric Approach to...
Roughly 95 percent of cyber incidents can be traced back to human error – a clear signal that a mature cyber strategy requires so much more than tooling. In this episode of Meet the Chief, we talk with Proofpoint CEO Sumit Dhawan about why Proofpoint is taking a more human-centric approach to cyber and how AI is changing the equation – from both the defender and attacker perspective. What to expectMeet the Chief is a series of virt...
CDM Success Stories in an Age of Cyber-...
The cyber-attack surface has exploded to include more than just hardware and on premises devices. This can make implementing CDM and achieving success even more difficult-- one of the most common challenges has always been finding the time and resources to do so. So how are agency cyber leaders keeping up? While the Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation (CDM) program is now a dozen years...
July 10, 2024
Organizer:
FedInsider Location:
Webcast
Strengthening Government Resilience Aga...
Government facilities were the third largest ransomware target in 2023, highlighting the need for secure storage. As a result, federal leaders are exploring and implementing cutting-edge tools to proactively tackle emerging ransomware threats. Secure storage solutions offer a means to safeguard digital assets and sensitive data so that cybersecurity and IT teams can fortify their agencies’ resilience against evolving attacks. Join Nextgo...
Quantum Speaker Series PQC Roadmap
Christian Lowry is the Emerging Risks Branch Chief in the National Risk Management Center, part of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Christian leads a team of analysts assessing risks to critical infrastructure from emerging technologies, including artificial intelligence and quantum computing. Christian has also led NRMC’s analysis efforts related to the Information...
July 9, 2024
Organizer:
ATARC Location:
Webcast
Elastic GenAI and Security Workshops
Join us for an engaging and informative workshop event! Choose between our cutting-edge GenAI Workshop, where you'll explore the latest advancements in generative AI and learn how to implement them in your projects, or our hands-on Security Analyst Workshop, designed to enhance your skills in identifying and mitigating security threats. Whether you're looking to innovate with AI or strengthen your cybersecurity expertise, this event offers val...
July 9, 2024
Organizer:
Elastic Location:
Scottsdale, AZ
Practical Threat Modeling Based on Comm...
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
Cloud Safe Task Force: Delivering the N...
The Cloud Safe Task Force (CSTF) recommends establishing a National Cyber Feed (NCF) — a public-private collaborative effort for comprehensive situational awareness of cyber threats and responses, fed by real-time security information from major U.S. cloud service providers (CSPs) and used by leading federal cybersecurity organizations including the Office of the National Cyber Director (ONCD), Office of the Federal Chief Information Off...
July 1, 2024
Organizer:
ATARC Location:
Virtual
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
Cyber Security Training at SANS San Ant...
Unlock the full potential of your career with cyber security training at SANS SANS San Antonio 2024 (June 24-29, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in...
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.