How to Implement an Effective Threat Hu...
In this webinar How to Implement an Effective Threat Hunting Practice, CTO of Lumu, Jeff Wheat, will discuss: The different types of threat hunting practices Requirements for an effective threat hunting effort Three key steps to develop an effective, yet simple threat hunting practice
Tackling the Necessity of Converged IT/...
Federal agencies take seriously the cybersecurity of their IT systems. They must observe numerous federal policies and programs, from Executive Order 14028 on down. Many agencies are far less aware of the need to strengthen the security of their operations technology (OT), the equipment that runs many kinds of systems, including healthcare. Historically, that was less of an issue since most OT systems were closed and standalone. But the intern...
August 29, 2023
Organizer:
FEDINSIDER Location:
Webcast
Hybrid/Multi-Cloud Data Managment and S...
Join this upcoming Cohesity webinar to learn how Cohesity can define multi-cloud data management platform for your data and apps. Cohesity natively integrates with AWS, Azure and GCP along with other cloud service providers to extend your on-premises data management solution to proven public cloud services. All through a single UI, you can now scale your data center into the Cloud with the flexibility, security, and control from Cohesity. From...
Achieving CMMC - Tangible Lessons from...
SMB defense contractors handling CUI are already required to meet the NIST 800-171 standards for protecting their data, but many are confused on how to get started and what tools to use. Join our upcoming webinar to help you and your cybersecurity team prepare for NIST 800-171 compliance and the DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. The webinar will provide practical answers and solutions regarding: Co...
Splunk .conf23 Debrief Series - Outpost...
Join Carahsoft and our partners who attended Splunk .conf23, for a webinar series where we dive into a debrief of how all these partners interact with Splunk. These webinars are designed to help introduce and familiarize you with all of our partners and what they can offer you and your organization. We have a wide variety of topics to discuss. See below for the schedule and click on the titles to get more details on each specific webinar. Don'...
Splunk .conf23 Debrief Series - Corelight
Join Carahsoft and our partners who attended Splunk .conf23, for a webinar series where we dive into a debrief of how all these partners interact with Splunk. These webinars are designed to help introduce and familiarize you with all of our partners and what they can offer you and your organization. We have a wide variety of topics to discuss. See below for the schedule and click on the titles to get more details on each specific webinar. Don'...
Blue Team Con
Blue Team Con is the only annual in-person conference created for cybersecurity defenders, inclusive of anyone interested in safeguarding organizations. Join more than 700 community-minded defensive cybersecurity experts for information sharing, relationship and career building events, and defense-focused talks held by some of the industry’s leading cybersecurity minds. Earn CPE credits in every one of our Trainings and Talks – ove...
August 25-27, 2023
Organizer:
Blue Team Con Location:
Chicago, IL
SANS Security Awareness: Managing Human...
Join us for the 10th annual SANS Security Awareness: Managing Human Risk Summit to learn, connect, and share with thousands of fellow security awareness, behavior and culture professionals from around the world. For this year’s event you have the choice of attending live online or in-person*. The 2023 Summit will feature: In-depth Summit Talks - The industry's top practitioners will share their latest research, technologies, and case stu...
INTERFACE Boise 2023
WELCOME TO INTERFACE Boise 2023! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate...
Emerging Trends & Best Practices to Com...
Ransomware attacks have become more frequent and sophisticated, causing significant damage and financial loss to businesses of all sizes. According to Verizon’s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years. The first half of 2022 saw nearly 236.7 million ransomware attacks worldwide, and hhe average cost of a ransomware attack was $1.85 million. Statistics reveal that a ransomware attack will occu...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.