Back to Search Begin New Search Save Search Auto-Notify
Security vs. Compliance: Can You Have Both?
Tired catchphrases such as "Compliance is not security", "You can't protect what you can't see" and "Cyber must speak the language of the business" abound in our industry, with numerous conversations focused on the problem. Given the rise of the API-centric economy, the time has come to end the debate once and for all around Security vs. Compliance Our panel of thought leaders shared best practices around: How to bridge the divide between secu...
Add Favorite
NASA Webcast Series: Data Security for All
VMware, August Schell and Carahsoft would like to offer you the opportunity to view these on-demand sessions on various topics that your organization may be interested in. On-demand: NASA IT Strategic Goal: People Anywhere Workspace: Revitalize Your Agency's Remote Work Strategy NASA IT Strategic Goal: Cyber SecurityCarbon Black: Deploy Advanced Threat Intelligence to Protect What Matters NASA IT Strategic Goal: Cyber SecurityNSX: Stop Cyberat...
Add Favorite
NASA Webcast Series: Data Security for All
VMware, August Schell and Carahsoft would like to offer you the opportunity to view these on-demand sessions on various topics that your organization may be interested in. NASA IT Strategic Goal: PeopleAnywhere Workspace: Revitalize Your Agency's Remote Work Strategy NASA IT Strategic Goal: Cyber SecurityCarbon Black: Deploy Advanced Threat Intelligence to Protect What Matters NASA IT Strategic Goal: Cyber Security NSX: Stop Cyberattacks and R...
Add Favorite
NASA Webcast Series: Data Security for All
VMware, August Schell and Carahsoft would like to offer you the opportunity to view these on-demand sessions on various topics that your organization may be interested in. View these on- demand sessions: NASA IT Strategic Goal: PeopleAnywhere Workspace: Revitalize Your Agency's Remote Work Strategy NASA IT Strategic Goal: Cyber SecurityCarbon Black: Deploy Advanced Threat Intelligence to Protect What Matters NASA IT Strategic Goal: Cyber Secur...
Add Favorite
The U.S. Securities and Exchange Commis...
The U.S. Securities & Exchange Commission recently proposed rules to strengthen the ability of public companies, funds, and advisors to combat cybersecurity threats and implement risk mitigation processes. SecurityScorecard was joined by Kristy Littman, U.S. Securities and Exchange Commission Chief of the Crypto Assets and Cyber Unit, Michael Daniel, President & CEO of the Cyber Threat Alliance and Friso van der Oord, Senior Vice Presi...
Add Favorite
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to view these on-demands on various topics that your organization may be interested in: Session One: Cybersecurity Maturity Model Certification (CMMC) Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0 Clarifications on the different phases of inclusion for bidders, contractors, and service providers How the Executive Order f...
Add Favorite
Bridging the Gaps of Cybersecurity
With 70% of government breaches caused by phishing, and the public sector being the second most victimized industry, the importance of aligning cybersecurity priorities is even more critical to winning the war against phishing. View this on-demand webinar to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions and learn expert insights on how you can protect your agency by combining the po...
Add Favorite
Unlocking Data to Drive Smarter and Saf...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability into a $100M weapon system as you do for a $500 laptop? Planes, tanks, and other weapon systems are composed of thousands...
Add Favorite
Google Cloud Work Safer Webinar with Cr...
In this on-demand webinar, you will learn about: Adversaries targeting public sector organizations and how to prepare to stop them How Google Cloud and CrowdStrike's integrated solutions provide proactive automation for threat hunting with shared intelligence across endpoints and workloads for a defense-in-depth infrastructure New strategies to achieve the highest levels of visibility, simplicity, and control to build stronger cybersecurity de...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
Back to Search Begin New Search