Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
December 12-14, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Keep Device Data Safe with Secure Erase
Embedded devices today are used to store a wide variety of data. While some of that stored data is inherently secure – possibly through encryption or encoding – not all designs provide a secure data removal option. For magnetic media, the data must be both erased AND overwritten – only then is the data securely deleted from the drive. Is this sufficient or overkill for NAND media? In this webinar you will learn: The importanc...
December 12, 2022
Organizer: Tuxera
Location: Webcast
Add Favorite
The State of Encrypted Attacks: What's...
A vast majority of today's attacks use encryption to bypass defenses. Zscaler's ThreatLabz team analyzes data from the world's largest security cloud, processing over 250 billion transactions per day, to uncover what threats are hiding in SSL/TLS. Join this webinar to learn and discuss how encrypted attacks are evolving, including: The fastest growing threat types The most targeted industries/geographies Where most enterprise defense strategie...
December 8, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
November 7-9, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Enabling True PIV/CAC Encryption for Em...
Email communication is a constant function of every agency, but strong encryption is a now a necessity. The PKI certificates needed to implement end-to-end encryption are already available to government employees and contractors using CAC, PIV, and PIV-I smartcards. However, agencies deliberately avoid large scale use of end-to-end encryption due to the difficulty of implementation and the need to decrypt encrypted email messages for authorize...
October 19, 2022
Organizer: Zeva Government Team at Carahsoft
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
September 19-21, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Anatomy of a Ransomware Operation
Ransomware attacks are no longer “drive-by” events. Encryption is only one of the problems among a list of others that include operational disruption and data exfiltration for extortion, ransom, sale, and re-sale. Join SANS Senior Instructor Jake Williams, SANS Instructor and BlackBerry Principal Incident Response Consultant Ryan Chapman, and BlackBerry Most Distinguished Threat Researcher Dmitry Bestuzhev as they dissect and anal...
September 16, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
The Quantum Security Challenge
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) this May. The NSM 10 fact sheet states that ...
August 25, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Defending Sensitive Government Data Aga...
Government contractors are increasingly a prime target for cyber-attacks, ranging from phishing and social engineering to malware and ransomware. Cloud computing, remote working and traffic encryption expand the attack surface while making threats harder to detect. How do we improve our network security in the face of these challenges? Network detection and response solutions can help detect potential breaches and prevent attackers from disrup...
August 23, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Ansible Security Policy Automation Workshop
Who is this workshop best for? This workshop is a hands-on introduction to using Red Hat® Ansible® Automation Platform® for technical professionals responsible for implementing and deploying security policies across their technology domain. An understanding of Ansible terminology and basic hands-on experience writing Ansible playbooks is valuable , and experience using Git and GitHub is necessary. This workshop is for those who wan...
August 18, 2022
Organizer: Red Hat
Location: Virtual
Add Favorite
Back to Search Begin New Search