From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 20, 2024
Organizer:
Zscaler Location:
Webcast
How the State of Vermont Lowers Its IT...
In today's dynamic cybersecurity landscape, visibility is paramount, particularly for public sector organizations. Vermont leads the way with risk management dashboards, offering real-time insights into cyber risk across all departments. Join us Tuesday, February 20 to hear from the state IT leaders who oversaw Vermont’s risk dashboard adoption process and discover tips for other states, cities, or counties on using risk dashboarding to...
How the State of Vermont Lowers its IT...
You can’t protect what you can’t see. That’s why the Center for Internet Security, NIST’s Risk Management Framework, and countless other leading cybersecurity authorities highlight the pivotal role of visibility in protecting organizations against cyber risk. But public sector organizations’ varied use of technologies, budgets and spheres of ownership can make measuring and lowering cyber risk particularly challen...
SANS Security East 2024: Keynote - Cybe...
As physical and cyber attacks on critical infrastructure and industrial control systems (ICS) have become increasingly brazen, ICS defenses must go beyond just preventative security. ICS defenses must be ICS-specific, teams need to be proactive and have ICS cyber specific knowledge and skills. This is because traditional IT security controls applied to ICS are ineffective, cause disruptions and safety interferences. ICS cyber defense is doable...
Security & Compliance Series
Securing Tomorrow: Assessing & Transforming Your Cybersecurity Defenses for 2024 As we step into 2024, the challenges and threats facing organizations are becoming more sophisticated and diverse. Cybersecurity defenses must transform to safeguard against new attack vectors and tactics so your business can stay ahead of the curve. Join us as we provide a comprehensive overview of the current and evolving cybersecurity landscape, key threat...
Gartner Cloud Security Cookbook: Build...
In today’s digital landscape, cloud security remains a significant challenge. With data often existing beyond our immediate control, ensuring its protection becomes vital. How can organizations effectively safeguard their data when control is limited? Join our experts in this complimentary Gartner cybersecurity webinar as they explore the emerging trends in cloud security, revealing how they can benefit your organization and providing pr...
February 16, 2024
Organizer:
Gartner Location:
Webcast
Infosec CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
February 12-16, 2024
Organizer:
Infosec Location:
Dallas, TX
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
Zero Trust Summit
Advances in AI-assisted technologies and the growing sophistication of international threat actors are increasing the stakes for federal agencies to implement new and more effective safeguards to protect the nation’s strategic data. Much of that effort revolves around the Biden administration’s Executive Orders on National Cybersecurity and related mandates coming due in 2024 to adopt zero-trust architectures across their enterpris...
February 15, 2024
Organizer:
CyberScoop Location:
Washington, DC
From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 15, 2024
Organizer:
Zscaler Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.