Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Adopt a More Human-Centric Approach to...
Roughly 95 percent of cyber incidents can be traced back to human error – a clear signal that a mature cyber strategy requires so much more than tooling. In this episode of Meet the Chief, we talk with Proofpoint CEO Sumit Dhawan about why Proofpoint is taking a more human-centric approach to cyber and how AI is changing the equation – from both the defender and attacker perspective. What to expectMeet the Chief is a series of virt...
July 10, 2024
Organizer: World Wide Technology
Location: Webcast
Add Favorite
CDM Success Stories in an Age of Cyber-...
The cyber-attack surface has exploded to include more than just hardware and on premises devices. This can make implementing CDM and achieving success even more difficult-- one of the most common challenges has always been finding the time and resources to do so. So how are agency cyber leaders keeping up? While the Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation (CDM) program is now a dozen years...
July 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Strengthening Government Resilience Aga...
Government facilities were the third largest ransomware target in 2023, highlighting the need for secure storage. As a result, federal leaders are exploring and implementing cutting-edge tools to proactively tackle emerging ransomware threats. Secure storage solutions offer a means to safeguard digital assets and sensitive data so that cybersecurity and IT teams can fortify their agencies’ resilience against evolving attacks. Join Nextgo...
July 9, 2024
Organizer: Nextgov/FCW
Location: Webcast
Add Favorite
Quantum Speaker Series PQC Roadmap
Christian Lowry is the Emerging Risks Branch Chief in the National Risk Management Center, part of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Christian leads a team of analysts assessing risks to critical infrastructure from emerging technologies, including artificial intelligence and quantum computing. Christian has also led NRMC’s analysis efforts related to the Information...
July 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Elastic GenAI and Security Workshops
Join us for an engaging and informative workshop event! Choose between our cutting-edge GenAI Workshop, where you'll explore the latest advancements in generative AI and learn how to implement them in your projects, or our hands-on Security Analyst Workshop, designed to enhance your skills in identifying and mitigating security threats. Whether you're looking to innovate with AI or strengthen your cybersecurity expertise, this event offers val...
July 9, 2024
Organizer: Elastic
Location: Scottsdale, AZ
Add Favorite
Practical Threat Modeling Based on Comm...
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
July 9, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cloud Safe Task Force: Delivering the N...
The Cloud Safe Task Force (CSTF) recommends establishing a National Cyber Feed (NCF) — a public-private collaborative effort for comprehensive situational awareness of cyber threats and responses, fed by real-time security information from major U.S. cloud service providers (CSPs) and used by leading federal cybersecurity organizations including the Office of the National Cyber Director (ONCD), Office of the Federal Chief Information Off...
July 1, 2024
Organizer: ATARC
Location: Virtual
Add Favorite
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
June 30, 2024
Organizer: Govcon Giants Inc
Location: Virtual
Add Favorite
Cyber Security Training at SANS San Ant...
Unlock the full potential of your career with cyber security training at SANS SANS San Antonio 2024 (June 24-29, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in...
June 24-29, 2024
Organizer: SANS Institute
Location: San Antonio, TX
Add Favorite
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
June 28, 2024
Organizer: Govcon Giants Inc
Location: Virtual
Add Favorite
Back to Search Begin New Search