Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Supply Chain Risk
The global supply chain is vulnerable to cyberattacks due to its diverse and multifaceted aspects. Cybersecurity supply chain risk management guidance is essential for businesses to protect themselves, their partners, and their consumers. They must assess cybersecurity risks at all levels of their organization and consider the vulnerabilities of all players involved in creating a product or service, particularly in light of increasing incidenc...
January 30, 2024
Organizer: Cloud Security Alliance | Cyble
Location: Webcast
Add Favorite
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
January 26, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Infosec CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
January 22-26, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
CyberSmart 2024: Cybersecurity Faces a...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance,...
January 25, 2024
Organizer: FedInsider
Location: Reston, VA
Add Favorite
Kaseya+Datto Connect Local Security + C...
Securing Tomorrow: Assessing & Transforming Your Cybersecurity Defenses for 2024 As we step into 2024, the challenges and threats facing organizations are becoming more sophisticated and diverse. Cybersecurity defenses must transform to safeguard against new attack vectors and tactics so your business can stay ahead of the curve. Join us as we provide a comprehensive overview of the current and evolving cybersecurity landscape, key threats...
January 25, 2024
Organizer: Kaseya + Datto
Location: Nashville, TN
Add Favorite
Cyber Range in 2024
Join World Wide Technology for an exciting Capture the Flag event coming in 2024! This placeholder will allow you to get a sneak peek at what's to come and share ideas to shape future CTF scenarios. Stay tuned for more details as we build an epic cybersecurity competition for next year. What to expect WWT's Cyber Range Capture The Flag events are dynamic, live-fire cyber exercises designed to give your security teams the real-world training th...
January 25, 2024
Organizer: World Wide Technology
Location: Virtual
Add Favorite
Carahsoft Cybersmart Federal Day 2024
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. Join Carahsoft and FedInsider on January 25th, as thought leaders from government and industry discuss how the continuing evolution of IT and its growing penetration into every corner of society presents...
January 25, 2024
Organizer: Carahsoft Technology Corp.
Location: Reston, VA
Add Favorite
AI: Future Threats and How to Combat Them
The threats facing federal agencies are becoming more challenging to predict and defend against. And for too long, security operations center (SOC) analysts have been inundated with alerts to triage manually, creating an inefficient game of whack-a-mole while critical alerts are missed and vulnerabilities remain exposed. Emerging technologies like artificial intelligence have the potential to flip that paradigm and put defenders back in the dr...
January 25, 2024
Organizer: Govexec 360 | Palo Alto Networks
Location: Webcast
Add Favorite
Private 5G's Role in Optimizing and Tra...
As cybersecurity concerns and connectivity challenges grow in the public sector, so does the need for more protected, seamless communication. A cellular network with dedicated access to private resources can support classified and confidential applications. Whether it’s hybrid cloud or on-premise, on the battlefield or in a hospital, public sector leaders can facilitate efficient communication by leveraging wireless technologies like pri...
January 25, 2024
Organizer: Govexec 360 | HPE Aruba Networking
Location: Webcast
Add Favorite
AI Virtual Cybersecurity Summit
Don't wait for a breach to happen, take action and safeguard your digital assets now! This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the AI/Virtual Cybersecurity Conference. Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors. Admissi...
January 25, 2024
Organizer: Data Connectors
Location: Virtual
Add Favorite
Back to Search Begin New Search