Back to Search Begin New Search Save Search Auto-Notify
Showing results for ransomware
Search instead for ransom ware
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
March 13, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Cybersecurity Summit 2024
Public sector organizations continue to face a constant barrage of sophisticated cyber threats. And with new cybersecurity mandates and guidance — from recent executive orders to the release of the 2023 National Cyber Strategy — public sector leaders must make considerable decisions about their cyber enterprise that will have lasting impacts for years to come. On top of this, the emergence of novel security capabilities built on ma...
February 27, 2024
Organizer: FEDSCOOP
Location: Washington, DC
Add Favorite
Navigating the Complex Landscape of Mod...
The cat-and-mouse game between threat actors and cybersecurity professionals continued unabated in 2023, with new threats designed to avoid detection. Many of these threats are new takes on old ones, such as “leveling up” invoice fraud. And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment by threatening to post the info online or t...
January 31, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Budgeting Ideas to Reach a Zero Trust Future
Ransomware, malware, phishing, DDoS, social engineering, zero-day exploit, botnets – the list of types of attacks out there is long enough to keep even the most seasoned cybersecurity expert awake at night. And with the increased use of remote computing, the cyber attack surface grows as more edge devices are added to networks. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity. In th...
January 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Be Prepared: The Cyber Wild West is Sti...
Events on the world stage are also playing out in cyberspace. Nation-states continue their kinetic wars into internet realms, commit crimes such as financial and intellectual property theft, and pursue their global strategic goals hidden from view. Ransomware attacks are increasing again. It’s a tough time for cybersecurity professionals. “We’re seeing attackers cause bigger impacts with less skills. They’re also more b...
November 29, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberWeek 2023
Join more than 10,000 influential leaders from the cybersecurity community at CyberWeek, the nation’s largest week-long cybersecurity festival focused on digital threats, online privacy, security innovation and the U.S. government’s work on improving cyberspace. CyberWeek is an annual movement bringing together top C-Suite leaders, information security pros, security researchers, state and federal officials and other influential de...
November 13-17, 2023
Organizer: CyberScoop
Location: Virtual
Add Favorite
CyberTalks
Cybersecurity and digital privacy concerns permeate every aspect of government and industry, driving geopolitical decisions and determining how organizations battle ransomware. Cyber is a critical component in the Ukraine war and informs how the U.S. confronts China's global influence. And the need for digital privacy protections has lawmakers pushing for new technology regulations. In the face of these developments, the brightest minds from...
November 16, 2023
Organizer: CyberScoop
Location: Washington, DC
Add Favorite
Cyber Resilience 2023 - Day One: How to...
Ever since the dawn of the internet, its value lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. Even hostile nation-states such as North Korea seek U.S. and state agencies’ data because they ne...
November 1, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
The Hard Truths of Data Security in the...
The growth in volume of data being generated every year is staggering. One company has estimated that an organization’s amount of data will triple within five years, between on-premises, cloud and software-as-a-service locations. On top of that, sensitive data – whether personally identifiable information, financial, intellectual property, etc. – can be scattered throughout the data ocean. In 2022, more than 200 government ag...
October 10, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Tackling the Necessity of Converged IT/...
Federal agencies take seriously the cybersecurity of their IT systems. They must observe numerous federal policies and programs, from Executive Order 14028 on down. Many agencies are far less aware of the need to strengthen the security of their operations technology (OT), the equipment that runs many kinds of systems, including healthcare. Historically, that was less of an issue since most OT systems were closed and standalone. But the intern...
August 29, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search