Defense in Depth: Multiple Layers of Pr...
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks. Join us for this expert-led webcast to explore how to implement and evolve a Defense-in-Depth (DiD) strategy tailored to your organization...
SANS 2025 SOC Survey Webcast & Forum
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs. Key topics examined on this webcast will include:Capabilities that comprise a SOC and what is outsourcedTechnology deployment and sati...
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer:
FedInsider Location:
Webcast
CMMC 2.0 | The 2025 Status Update
*** WEBINAR IS VIRTUAL ***Date: Wednesday - July 9, 2025Time: 10:00 am to 11:00 am (MDT)/ 12:00pm to 1:00pm ESTCost: FREELink to join: https://landing.govconalliance.com/registration-july09 CMMC 2.0 | The 2025 Status UpdateAs a follow-up to the August 2024 Contracting@Scale Webinar that Mr. Schmidt did on the status of CMMC 2.0, this new updated webinar will be jam packed with updates about the 32CFR and 48 CFR Regulatory Rules, and the impact...
Model Your Way to Better Cybersecurity
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. T...
July 9, 2025
Organizer:
CMU - SEI Location:
Webcast
Streamline Your Compliance Journey and...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory standards like NIST 800-53, RMF, and other frameworks. Join us for this informative webinar, where we’ll demonstrate how...
The Gartner Top Trends in Cybersecurity...
In an era of relentless technological and business disruption, the limits of security programs and team performance are constantly tested. Cybersecurity leaders face the dual challenge of not only protecting their organizations but also enabling business value. To prove the effectiveness of security programs in 2025, leaders must focus on embedding resilience at the organizational, personal and team levels. Join this complimentary Gartner webi...
July 1, 2025
Organizer:
Gartner Location:
Webcast
The New Print Frontier: Securing Endpoi...
Printers are no longer just peripherals — they’re endpoints. And for many organizations, they’re a vulnerable one. Join HP’s Steve Inch, for a live discussion that reveals how the evolving cybersecurity landscape — especially the rise of quantum computing — demands a new level of vigilance when it comes to securing your print infrastructure. We’ll dive into:Practical steps you can take immediately to i...
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
June 23-27, 2025
Organizer:
Infosec Location:
Virtual
CompTIA Cybersecurity Analyst (CySA+) C...
The CompTIA CySA+ Training Boot Camp prepares you to pass the CompTIA Cybersecurity Analyst (CySA+) certification exam by covering the following domains:Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools.Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices.Security op...
June 23-27, 2025
Organizer:
Infosec Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.