Live Demo - See, Protect and Manage You...
Secure the Connected Care Patient Journey: Unify and Protect Every Asset in Your Healthcare EcosystemHealthcare facilities rely on a broad spectrum of digital assets to provide a smooth patient care experience, from medical devices to building management systems and IT infrastructure. With increased reliance on technology comes greater cyber exposure risks. Ensuring the security of all medical devices, clinical assets, and the broader healthca...
December 11, 2025
Organizer:
Armis Location:
Webcast
Cyber Claus Comes to Town
Step into the holiday spirit with Diligent at Cyber Claus Comes to Town—Huntsville’s most festive celebration of the season. Enjoy live music, seasonal food and drinks and plenty of prizes and giveaways while connecting with Diligent’s Public Sector and CMMC readiness teams. Join UsIt’s the perfect chance to mix, mingle and swap insights on compliance and cybersecurity strategy in a fun, relaxed setting. Whether you...
CrowdStrike CTF: Falcon
CrowdStrike delivers a unified platform approach to modern security so you can protect and build your future. This game incorporates several new features of CrowdStrike, offering a unique opportunity to test your skills against the latest in cybersecurity technology. Tools utilized within the game:Crowdstrike Falcon (EDR tool, end point protection and analysis)Crowdstrike Logscale (History and logging)CrowdStrike Cloud Security CrowdStrike Ide...
From DISA STIGs to C2C and CORA: How to...
The Department of War faces significant challenges when it comes to adhering to complex reporting requirements whilst defending their networks against sophisticated adversaries. They require automation and network visibility that enables them to: Achieve compliance: Ensure continuous alignment with DoW cybersecurity programs (C2C, CORA) through automated compliance assessments (STIG, Zero Trust). Reduce network risk: Identify, prioritize, and...
Cybersecurity Insights - An Interactive...
As a known hub for the direction of geopolitics, sanctions, and trade, the Department of State is an attractive target for advanced nation-state threat actors motivated more by a desire for information than by greed, and as public-facing representatives of the U.S. overseas, diplomat staff and buildings don’t have the benefit of anonymity. Deputy Assistant Secretary Gharun Lacy will share Diplomatic Security's cybersecurity strategies fo...
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
December 15-19, 2025
Organizer:
Infosec Location:
Virtual
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
ATARC Cyber AI Convergence Working Grou...
ATARC is excited to kick off our Cyber AI Convergence Working Group with an exclusive virtual roundtable featuring a curated panel of government leaders in the integration of artificial intelligence and cybersecurity spaces. This inaugural session will help shape the group’s direction and set its key priorities moving forward.Held under the Chatham House Rule, this candid and collaborative discussion will provide a unique opportunity to...
December 16, 2025
Organizer:
ATARC Location:
Virtual
DNS: The Blind Spot in Federal Cybersecurity
"Traffic for DNS lookups often goes largely unmonitored by many security tools. Whereas web and email traffic are often closely scrutinized, DNS traffic largely represents a blind spot for such defenses." Sound familiar? In today’s evolving threat landscape, adversaries are exploiting this overlooked protocol to infiltrate federal networks, embedding malware in DNS TXT records and bypassing traditional defenses. Even sophisticated agenci...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.