Back to Search Begin New Search Save Search Auto-Notify
IBM TechU talks: Fully Homomorphic Encr...
Unlock the value of data on less trusted domains without needing to decrypt it. Use Fully Homomorphic Encryption (FHE) to securely collaborate with other institutions across borders and product lines to fight financial crime, determine disease prognosis, or secure supply chains - all while preserving privacy.
September 28, 2021
Organizer: IBM
Location: Webcast
Add Favorite
Introduction to Governance and Complian...
Course Details Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources. To sign up for this training, first register for the AWS Summit Washington, DC. Breakfast...
September 27, 2021
Organizer: Amazon Web Services (AWS)
Location: Washington, DC
Add Favorite
Introduction to Governance and Complian...
Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources.
September 3, 2021
Organizer: Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Using a Smartphone? Important CJIS Cons...
Smartphones provide operational benefits that can be significantly expanded if officers can access criminal justice databases. This requires compliance with Criminal Justice Information Services (CJIS) policy and can be somewhat challenging. This webinar will provide clear guidance on key areas including multi-factor authentication, mobile device management, encryption requirements, and compensating control options. Presenters include a vetera...
August 31, 2021
Organizer: International Public Safety Association (IPSA)
Location: Webcast
Add Favorite
Prepare for Transformational Changes to...
With the recent cybersecurity threats and attacks, including breached content, the shutdown and lock outs of systems and the recurrence of ransomware, the reality of the need for zero-trust and cybersecure systems is evident. The White House responded with a new Cybersecurity Executive Order that lays out and defines stringent mandates to update policies and procedures across government entities for adopting cybersecurity best practices. These...
July 15, 2021
Organizer: AFCEA International | Signal Webinar Series
Location: Webcast
Add Favorite
Authentication and the White House Cybe...
In May, the White House issued its Executive Order on Improving the Nation's Cybersecurity. The EO states as policy, “Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life. The Federal Government must bring to bear the full scope of its authorities and resources...
July 15, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Introduction to Governance and Complian...
Course Details Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources. Topics Covered: Identify and describe the security benefits and responsibilities of using...
June 25, 2021
Organizer: Amazon Web Services (AWS)
Location: Webcast
Add Favorite
CyberRx: Securing Healthcare Data
The core goal of any public sector healthcare facility is to provide the best possible care for their patients. But those facilities are also charged with the safekeeping of their patient’s medical data and personal information. Exactly how that data should be protected is tightly defined through regulations like the electronic protected health information rules as well as laws like the Health Insurance Portability and Accountability Act...
June 24, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
WhatWorks in Deploying Effective and Ef...
Business damages from ransomware and phishing attacks have made it clear that sensitive business information and application must be better protected. Increased enforcement of national- and state-level privacy laws, as well as the need to secure data across multiple cloud environments, has highlighted the need for reliable and transparent data encryption services to protect information while enabling business access. During this SANS WhatWorks...
June 16, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
Ransomware Resilience in a Multicloud Era
Ransomware is rapidly emerging as the most visible cybersecurity risk playing out across our nation’s networks. Criminals are establishing increasingly sophisticated operations by pivoting their attacks from data encryption to exfiltration, complicating the security challenges already created by remote working. The organizations unable to implement detection and response solutions leave themselves open to many types of data integrity att...
June 15, 2021
Organizer: GovExec
Location: Webcast
Add Favorite
Back to Search Begin New Search