Back to Search Begin New Search Save Search Auto-Notify
Showing results for ransomware
Search instead for ransom ware
Protecting Your Agency and Data from Ra...
Join us for a luncheon briefing where you can connect with an exclusive group of your peers to learn how others are approaching the ransomware problem and hear real-world advice on how to prepare and respond! Since the start of 2016, there has been an increase in frequency and sophistication of ransomware attacks. Criminals deploy ransomware everywhere and hold entire organizations hostage on a daily basis. To combat these threats, government...
January 31, 2017
Organizer: Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
The Simple Secret to HIPAA Compliance
The secret is - HIPAA Rules are easy and routine to follow - when they are explained step-by-step in plain language. In this seminar Paul Hales will capture your attention with visual presentations, discussion and learning exercises and show how to find the right rule with the step-by-step procedures you need when you need them. Seminar Takeaways Thorough Understanding of HIPAA Rules What they are How they work together Why and How they were m...
January 19-20, 2017
Organizer: GlobalCompliancePanel
Location: Boston, MA
Add Favorite
Disaster Recovery for Security ...
The use of video surveillance has become an imperative part of securing our society: Military and intelligence agencies conduct aerial surveillance, terrain mapping, and urban reconnaissance via video surveillance. Mass transit monitoring is taking place in airports, in-bus cameras, train stations, and freight trains. Law enforcement agencies are using dashboard and body-mounted cameras, license plate recognition, prison and detention and dron...
December 8, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Master HIPAA Compliance in Six Steps
Overview: The secret is - HIPAA Rules are easy and routine to follow - when they are explained step-by-step in plain language. In this seminar Paul Hales will capture your attention with visual presentations, discussion and learning exercises and show how to find the right rule with the step-by-step procedures you need when you need them. Seminar Takeaways: Thorough Understanding of HIPAA Rules What they are How they work together Why and How...
December 1, 2016
Organizer: GlobalCompliancePanel
Location: Baltimore, MD
Add Favorite
SANS 4th Annual Healthcare Cybersecurit...
SANS will be hosting its 4th Annual Healthcare Cybersecurity Summit. Join us and hear top security experts from leading healthcare companies discuss proven approaches for securing and succeeding in the new healthcare environment. You'll have the opportunity to meet with leaders from top organizations and see what really works in securing healthcare. As we know, healthcare has been undergoing major changes. Patients are demanding more convenien...
November 14-21, 2016
Organizer: SANS Institute
Location: Houston, TX
Add Favorite
Defend Yourself and Your Agency Against...
What would you do if your agency's data was held ransom and the only way to get it back was to pay someone $17,000? That's exactly what happened to Hollywood Presbyterian Medical Center earlier this year. Ransomware is a type of malicious software restricting access to a victim’s infected computer, demanding the victim pay money to gain access back. While the average ransom is only a few hundred dollars for individuals, hackers are begin...
October 19, 2016
Organizer: Security Innovation Government Team at Carahsoft
Location: Webcast
Add Favorite
Emerging Cyber Threats in Government
The interconnectivity of global networks has changed the nature of cyber threats. In addition to hactivists intent on mischief, organized criminal groups and nation-state adversaries seek intelligence, financial gain, and government and corporate secrets. Online, the battle rages on with stolen personally identifiable information (PII), ransomware, and the health data from the Internet of Things part of the global landscape. Commercial and gov...
September 15, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Surviving a Modern Cyber Attack with Is...
Join us for an exclusive webcast during which we'll share intelligence and lessons learned from these attacks. In addition, you'll discover:Threat and risk - what's different about the latest ransomware and extortionware cases and how IT teams are approaching the problemVisibility and detection - what IT teams can do to protect their environmentsRemediation and recovery - best practices and lessons learned on how to recover from an attackCyber...
September 7, 2016
Organizer: EMC & Carahsoft
Location: Webcast
Add Favorite
Protecting Your Agency and Data from Ra...
EMC, RSA, and Carahsoft are hosting an exclusive briefing for federal agencies to share intelligence and lessons learned. Space is limited, so don’t miss this great opportunity! Since the start of this year, there has been an increase in frequency and sophistication of ransomware attacks. Criminals deploy ransomware everywhere and hold entire organizations hostage on a daily basis. To combat these threats, federal agencies need to think...
August 25, 2016
Organizer: Carahsoft Technology Corp.
Location: Virtual
Add Favorite
How to Protect Your Organization from t...
2016 is shaping up to be the year of ransomware. Cyber-attacks are on the rise, with agencies losing control of their critical assets. And the problem isn’t going away.Could your agency fall victim to these malicious attacks? Everyone is vulnerable, but the good news is that there are simple steps you can take today using security tools you already have. Best practice for security suggests that your agency should be following a framework...
July 26, 2016
Organizer: Tripwire at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search