Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
July 7-11, 2025
Organizer: Infosec
Location: Virtual
Add Favorite
The Modern Endpoint - It's Personal
Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a security standpoint. Traditional Mobile Device Management (MDM) solutions weren’t built to detect advanced threats or align with Zero Trust principles. They offer basic control, but not the telemetry, risk context,...
July 10, 2025
Organizer: Fedinsider
Location: Webcast
Add Favorite
Step-by-Step to SASE: A Guided Approach...
Cybersecurity in the public sector is complex — especially when you're balancing compliance mandates, legacy systems, and growing remote work demands. For many agencies, Secure Access Service Edge (SASE) has become the goal. But getting there? That’s the challenge. Join Government Technology, Palo Alto Networks, and LevelBlue for a discussion that will dive into a clear, step-by-step guide to help you build a strong SASE strategy n...
July 10, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Orange County Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
July 10, 2025
Organizer: FutureCon
Location: Garden Grove, CA
Add Favorite
Defense in Depth: Multiple Layers of Pr...
Webcast 4 of 5 in our Special Series—Explore the full lineup here. In today’s complex threat landscape, no single security solution is enough. A modern cybersecurity strategy requires layered, overlapping defenses to detect, prevent, and respond to both external threats and insider risks. Join us for this expert-led webcast to explore how to implement and evolve a Defense-in-Depth (DiD) strategy tailored to your organization...
July 10, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
How to Get Your Security Aligned with t...
Katie Arrington, the acting CIO for the Department of Defense, is fiercely determined to enforce the requirements of the Cybersecurity Maturity Model Certification (CMMC), considering it a primary defense against China’s cyber incursions – and one she expects the Defense Industrial Base (DIB) to meet. Among best practices suggested for achieving CMMC is maintaining a comprehensive, accurate asset inventory, because it defines the b...
July 9, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CMMC 2.0 | The 2025 Status Update
*** WEBINAR IS VIRTUAL ***Date: Wednesday - July 9, 2025Time: 10:00 am to 11:00 am (MDT)/ 12:00pm to 1:00pm ESTCost: FREELink to join: https://landing.govconalliance.com/registration-july09 CMMC 2.0 | The 2025 Status UpdateAs a follow-up to the August 2024 Contracting@Scale Webinar that Mr. Schmidt did on the status of CMMC 2.0, this new updated webinar will be jam packed with updates about the 32CFR and 48 CFR Regulatory Rules, and the impact...
July 9, 2025
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
SANS 2025 SOC Survey Webcast & Forum
In 2025, the SANS SOC Survey will extend its detailed inspection of cybersecurity operations centers. By exploring the capabilities and outsourcing; architectures and cloud use; technologies; hiring and staffing; metrics and funding; threat intel; and automation we develop a global picture of the state of SOCs. Key topics examined on this webcast will include:Capabilities that comprise a SOC and what is outsourcedTechnology deployment and sati...
July 9, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
Model Your Way to Better Cybersecurity
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering (MBSE) to form mitigation strategies effective from early in the systems engineering lifecycle. T...
July 9, 2025
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Streamline Your Compliance Journey and...
Compliance is a cornerstone of any modern cybersecurity strategy, especially as agencies and organizations work toward implementing Zero Trust principles. Splunk's Compliance Essentials App simplifies the compliance process by providing tools to assess, monitor, and report on your environment's adherence to regulatory standards like NIST 800-53, RMF, and other frameworks. Join us for this informative webinar, where we’ll demonstrate how...
July 1, 2025
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search