Back to Search Begin New Search Save Search Auto-Notify
Zero Trust and the Power of Isolation f...
With the growing threat of cyber attacks, DHS’s Cybersecurity and Infrastructure Agency (CISA) and the White House have recently released guidelines for agencies to adopt a Zero Trust approach to cybersecurity. Isolation is paramount to Zero Trust Architecture. Isolation creates a virtual "air gap" between the network end user and the online world. Instead of opening a website directly, the end user sees a sanitized version of it with al...
April 13, 2022
Organizer: DLT Solutions | Menlo Security
Location: Webcast
Add Favorite
Digital Risk Reconnaissance Across the...
Organizations face a myriad of risks brought about by the digital transformation of their business. These risks include digital fraud, data theft exposure, social media impersonations and phishing attempts within social media and the hidden areas of the open, deep and dark web.Join CrowdStrike's upcoming Tech Talk as they go over CrowdStrike Falcon X Recon™, created to expose the criminal underground and enable organizations to better pr...
June 15, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
DevSecOps Readiness: Analyzing Legacy A...
The transition to Agile development is complex and challenging, especially for legacy programs. Where do you start and what obstacles may exist? Agile and DevSecOps are often touted as silver bullets to accelerating delivery of mission winning capability. These modern development and deployment methodologies offer many benefits, but navigating their implementation requires a data-driven understanding of which applications will benefit the most...
February 23, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Hybrid Threats: The Synthesis of Advanc...
Today’s most advanced nation-state adversaries, to include groups originating from within Russia, China, Iran, and North Korea, are engaged in cyber operations that blur the lines between nation-state objectives and organized crime. Whereas many nations have difficulty controlling cyber-crime originating from within their borders, the above-aforementioned nations are complicit with several major organized crime groups. Accordingly, the p...
February 18, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Nation-State Threat Landscape Overview: Iran
Join CrowdStrike for a deep dive into the nation-state threat landscape of Iran. Jason Rivera, Global Director - Strategic Threat Advisory Group at CrowdStrike, will give a brief on the broader geopolitical context for the latest Iranian cyber activities, an overview of the primary threat actors responsible for Iranian offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share mitigation...
January 13, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Nation-State Threat Landscape Overview: China
Join CrowdStrike for a Join CrowdStrike for a deep dive into the nation-state threat landscape of China. Joshua Shapiro, CrowdStrike’s public sector threat intel SME, will give a brief on the broader geopolitical context for the latest Chinese cyber activities, an overview of the primary threat actors responsible for Chinese offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share...
December 9, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
The Evolution of Ransomware for Governm...
Financially motivated transnational criminal groups, primarily operating out of eastern Europe, Russia, and Iran have found ransomware to be a powerful tool for profit generation. The targeting of U.S. state and municipal governments, healthcare institutions, critical infrastructure providers, and our nation’s universities coupled with the rise of big game hunting, ransomware as a service, and increased collaboration between adversarial...
November 11, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Protecting Our Nation’s Election Infras...
Across the globe, elections are under threat of manipulation and interference. Adversaries increasingly attempt to use offensive cyber operations to directly affect political outcomes. From intelligence collection and “hack and leak” campaigns to election infrastructure targeting, nation-state adversaries around the globe see election interference as a means to advance their national security and political interests. Although diffe...
October 22, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
ICIT Fall Briefing: A Secure Roadmap Fo...
Roll up your sleeves and connect with top cybersecurity experts for this virtual hands-on collaboration project. Walk away with a framework that you can implement immediately and learn how to crowdsource solutions for your next crisis. Join us on October 14-15, 2020, to discuss your FUD (Fear, Uncertainty, and Doubt) in this new normal. This is more than your typical webinar - #CyberExperience #NoFUD Overview: Speed, agility, and a new underst...
October 14-15, 2020
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Back to Search Begin New Search