Navigating Intelligence-Driven Cyber Defense
Intelligence-driven cyber defense operations and other similar phrases are commonly heard in industry today, but what is truly meant by this turn of phrase? In this talk, we aim to explore this topic as it relates to the cyber defense landscape and the imperative need for public sector agencies to have access to actionable up-to-date insights on known malicious actors’ tactics, techniques, and procedures (TTPs). This enables network defe...
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
Security Summit - New York City
Join us at the upcoming Cybersecurity Summit to discover how you can enhance your cybersecurity strategy for 2024 and beyond. OpenText is at the forefront of cybersecurity advancements, and our experts will share insights on how we're reshaping the industry to combat cyber threats effectively. Explore OpenText's cutting-edge innovations and cybersecurity solutions that are revolutionizing proactive cyber defense. At the summit, you'll: Gain in...
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer:
Trellix Location:
Webcast
Automate, Analyze, Act: Streamlining Yo...
Join Elastic and the Arizona Department of Homeland Security (AZDOHS) to learn how their agency is leveraging Elastic to combat evolving threats. Elastic provides a centralized security information and event management (SIEM) platform and log aggregation, offering real-time visibility for improved cybersecurity and threat detection. With Elastic, organizations of all sizes can streamline log analysis, prioritize alerts based on threat relevanc...
Ready, Set, Go!! - Procurement Readiness
Join us for our exciting 'Ready Set Go' presentation and get started on your path to mastering government procurement! Learn the secrets of professionalism and client respect and how to communicate your company's unique value. Learn about essentials such as how to register with SAM and SBA, and cybersecurity certification, and more.
The Gartner Cybersecurity Outlook for M...
Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver IT services with small IT teams and limited IT budgets. Across industries, MSE IT budgets average 4.9% of annual revenue, but only 5% of the IT budget is dedicated to security. The need to create a strong, mature security posture remains. Join this complimentary Gartner security and risk webinar as Gartner expert Paul Furtado explores the top trends...
April 29, 2024
Organizer:
Gartner Location:
Webcast
SANS Pen Test Austin 2024
Keep Hacking Weird in Austin for Hands-On Cyber Security Training SANS Pen Test Austin 2024 is the premier offensive security training event of the year, featuring six days of in-depth, hands-on pen testing, red teaming, purple teaming, and exploit training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks. Come for the hack...
Ask The Experts: A Deeper Approach to S...
Join Government Technology, HP and AMD for a live webinar in our Ask the Experts Digital series. The series dedicates half of each session to audience questions and comments, giving attendees direct access to industry experts. This session will cover building technology stacks that address today’s growing security and compliance concerns. In this exclusive session, attendees will: Join a live discussion with technology experts with exper...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.