Cyber Insurance: Insider Tips to Ace Un...
Join BlackBerry and Carahsoft to learn how the preparations and choices you make before and during the underwriting process will lead to vastly different outcomes in the cost of your premiums. Stan Gatewood, a former Chief Information Security Officer will address this topic while receiving insider tips from Jeffrey Smith, Managing Partner at CyberRisk Underwriters. View this on-demand webinar to hear from two leading experts within the indust...
Turning on the Light in Supply Chain Il...
In an ever-changing geopolitical landscape, understanding your global supply chain and finding inherent risks at speed and scale has never mattered more. View our on-demand webinar to gain an insider’s view on how to identify supply chain issues, quickly comprehend them, and accelerate mission-critical decisions. In our session, we share practical guidance to help you transform your Supply Chain Risk Management (SCRM) from theoretical to...
AWS New York Virtual Innovation Day
AWS returned to New York! View this on-demand to see our second annual AWS New York Virtual Innovation Day. Complete with multiple sessions, this event focuses on the practical aspects of migration, end-user computing, and cost mitigation. Learn how the sophisticated, yet simple, AWS approach can help your agency thrive.
Protect Your Controlled Unclassified In...
Classified Unclassified Information (CUI) is the path of least resistance for adversaries, and loss of aggregated CUI is one of the most significant risks to national security. Protecting your CUI is the most critical data protection topics for 2021. If your agency is only using encryption of data-at-rest (db) and encryption of data-in-transit (SSL); you are significantly exposed when your data is utilized and displayed within your apps. Your...
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
MF Compliance with Splunk: Continuous M...
The Risk Management Framework (RMF) was introduced to help federal agencies better manage the many risks correlated with operating an information system. Splunk offers a flexible, cost-efficient, and integrated solution to allow agencies to meet their RMF compliance requirements. NIST Special Publication 800-53 is the set of security and privacy controls designed to protect organizations from cybersecurity risks that are the result of an ever-...
Unit 42 by Palo Alto Networks
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. As threats escalate, Unit 42 is available to advise federal agencies on the latest risks, assess their readiness and help them recover when the worst occurs. Whether responding to a breach or managing cyber risk, Palo Alto Networks understands your challenges. Hailing from US govern...
Cyber Threats & Lessons Learned from 20...
View this on-demand webinar to review some of the most impactful hacks from 2021 and the key takeaways for protecting critical data and infrastructure as we enter into the new year of 2022. Topics discussed include: A review of some of the most effective hacks of 2021 such as the Colonial Pipeline ransomware incident, SolarWinds supply chain attack, Microsoft Exchange hack, NSO Group Apple iOS hack with Pegasus, and more. Why an understanding...
Protect Your Agency's Data with Rubrik...
View this on-demand webinar discover how Rubrik and Clearshark can defend your agency's data against cyber attacks. Experts from Rubrik and Clearshark discuss how Rubrik's unique immutability and zero trust architecture, integrated with Clearshark's innovative solutions, instills confidence that your organization's data can be quickly and accurately recovered. Our featured speakers dive into the industry- changing Rubrik and Clearshark integr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.