Threat Hunting: What Should Keep All of...
When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine inspections that point toward further investigation—overlooking obvious needs right u...
March 26, 2025
Organizer:
CMU - SEI Location:
Webcast
GSA CyberEd Series: C-SCRM Acquisition...
To gain confidence in the security of their systems, agencies must analyze their software and its deployed functionality with a comprehensive and rigorous approach, whether their software is built internally or by a contracted vendor. This two-day webinar will provide an educational overview of the Cybersecurity Supply Chain Risk Management Acquisition Guide offering the foundational understanding and assist organizations with acquiring the pr...
Cyber Security for Critical Assets (CS4CA)
The Cyber Security for Critical Assets summit unites 250+ senior cybersecurity leaders, providing a valuable platform for experts to connect, learn and collaborate towards cyber resilience for America’s critical infrastructure. Expect to be both challenged and inspired, as we uncover new techniques and defence mechanisms from some of the world’s leading cybersecurity innovators. Hear exclusive keynotes from trail-blazing industry e...
March 25-26, 2025
Organizer:
QG Media Location:
Houston, TX
Break Away from Legacy: Improve Securit...
Federal agency professionals are seeking to save resources, meet evolving mission requirements, secure information assets, and modernize IT infrastructure. These once-daunting problems can now be overcome with integrated solutions tailored to specific missions, data types, IT architectures, and resources. Join Fortinet Federal, Granite, and Four Inc. for this one-hour webinar to discover how your agency can break free of cumbersome legacy syst...
March 25, 2025
Organizer:
Four Inc. Location:
Webcast
Choosing the Right GRC Tool: Insights f...
In this webcast we will delve into the critical process of selecting a Governance, Risk, and Compliance (GRC) software tool that aligns with your organization's needs. In today's complex cybersecurity landscape, the ability to effectively track risks and communicate them to business stakeholder s is essential for informed decision-making and strategic growth. This webcast, led by James Tarala, Senior Faculty at the SANS Institute and Managing...
Microsoft Virtual Briefing - Data Secur...
Generative AI is a powerful technology that can create realistic content such as text, images, or audio. However, this also poses new challenges for data security, as the data that is fueling the AI needs to be properly classified and secured. In this session, we will discuss the current state of generative AI and its implications for data security, and explore how Microsoft's cybersecurity solutions can help you protect your data from threats...
March 25, 2025
Organizer:
Microsoft Location:
Webcast
GSA CyberEd Series: C-SCRM Acquisition...
To gain confidence in the security of their systems, agencies must analyze their software and its deployed functionality with a comprehensive and rigorous approach, whether their software is built internally or by a contracted vendor. This two-day webinar will provide an educational overview of the Cybersecurity Supply Chain Risk Management Acquisition Guide offering the foundational understanding and assist organizations with acquiring the pr...
Cyber Risk Workshop - How to Measure an...
Calling all public sector CISOs, Deputy CISOs, risk management leaders, zero trust architects and CDM leaders: You are cordially invited to attend this in-person, interactive workshop to learn about key aspects of measuring and communicating risk, while also sharing knowledge and best practices with both your internal and interagency peers. The workshop will be facilitated by Richard Seiersen, Cybersecurity Author and Chief Risk Technology Off...
March 25, 2025
Organizer:
Qualys Location:
Washington, DC
Building on the Zero Trust Foundation
Federal agencies have spent the last several years putting their Zero Trust (ZT) architecture in place as the foundation for a “never trust, always verify” cybersecurity strategy. The Continuous Diagnostics and Mitigation (CDM) program at the Cybersecurity and Infrastructure Security Agency (CISA) has been a key facilitator for agencies pursuing ZT, since continuously identifying and fixing cybersecurity threats is one of CISA...
March 25, 2025
Organizer:
FedInsider Location:
Webcast
Navigating AI-Powered Cyber Threats: Wh...
AI isn’t just changing cybersecurity—it’s changing how attacks happen. Threat actors are using AI to scale phishing, automate exploits, and adapt faster than ever before. Meanwhile, security teams are left sorting through AI-driven tools, trying to figure out what actually helps and what’s just hype. How do you defend against threats that evolve in real time? And how do you make sure AI is working for you—not agai...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.