Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 20, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
How the State of Vermont Lowers Its IT...
In today's dynamic cybersecurity landscape, visibility is paramount, particularly for public sector organizations. Vermont leads the way with risk management dashboards, offering real-time insights into cyber risk across all departments. Join us Tuesday, February 20 to hear from the state IT leaders who oversaw Vermont’s risk dashboard adoption process and discover tips for other states, cities, or counties on using risk dashboarding to...
February 20, 2024
Organizer: Tanium Government Team at Carahsoft
Location: Webcast
Add Favorite
How the State of Vermont Lowers its IT...
You can’t protect what you can’t see. That’s why the Center for Internet Security, NIST’s Risk Management Framework, and countless other leading cybersecurity authorities highlight the pivotal role of visibility in protecting organizations against cyber risk. But public sector organizations’ varied use of technologies, budgets and spheres of ownership can make measuring and lowering cyber risk particularly challen...
February 20, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
SANS Security East 2024: Keynote - Cybe...
As physical and cyber attacks on critical infrastructure and industrial control systems (ICS) have become increasingly brazen, ICS defenses must go beyond just preventative security. ICS defenses must be ICS-specific, teams need to be proactive and have ICS cyber specific knowledge and skills. This is because traditional IT security controls applied to ICS are ineffective, cause disruptions and safety interferences. ICS cyber defense is doable...
February 20, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Security & Compliance Series
Securing Tomorrow: Assessing & Transforming Your Cybersecurity Defenses for 2024 As we step into 2024, the challenges and threats facing organizations are becoming more sophisticated and diverse. Cybersecurity defenses must transform to safeguard against new attack vectors and tactics so your business can stay ahead of the curve. Join us as we provide a comprehensive overview of the current and evolving cybersecurity landscape, key threat...
February 20, 2024
Organizer: Kaseya + Datto
Location: Atlanta, GA
Add Favorite
Gartner Cloud Security Cookbook: Build...
In today’s digital landscape, cloud security remains a significant challenge. With data often existing beyond our immediate control, ensuring its protection becomes vital. How can organizations effectively safeguard their data when control is limited? Join our experts in this complimentary Gartner cybersecurity webinar as they explore the emerging trends in cloud security, revealing how they can benefit your organization and providing pr...
February 16, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Infosec CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
February 12-16, 2024
Organizer: Infosec
Location: Dallas, TX
Add Favorite
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
February 15, 2024
Organizer: Defense Acquisition University
Location: Webcast
Add Favorite
Zero Trust Summit
Advances in AI-assisted technologies and the growing sophistication of international threat actors are increasing the stakes for federal agencies to implement new and more effective safeguards to protect the nation’s strategic data. Much of that effort revolves around the Biden administration’s Executive Orders on National Cybersecurity and related mandates coming due in 2024 to adopt zero-trust architectures across their enterpris...
February 15, 2024
Organizer: CyberScoop
Location: Washington, DC
Add Favorite
From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 15, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
Back to Search Begin New Search