Back to Search Begin New Search Save Search Auto-Notify
From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 20, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
Teaming Partners: Can't Live without Them!
In order to be successful in Government contracting we need each other, so how do why are the right team members crucial? Join me to explore those ideas.
February 20, 2024
Organizer: Govcon Giants Inc
Location: Virtual
Add Favorite
How the State of Vermont Lowers its IT...
You can’t protect what you can’t see. That’s why the Center for Internet Security, NIST’s Risk Management Framework, and countless other leading cybersecurity authorities highlight the pivotal role of visibility in protecting organizations against cyber risk. But public sector organizations’ varied use of technologies, budgets and spheres of ownership can make measuring and lowering cyber risk particularly challen...
February 20, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
How to Make Cold Calls to Federal Buyer...
Is cold calling stopping your government contracting success? Learn to push past your resistance to cold calling,understand the calling metrics, follow scripts and templates that start conversations with federal buyers and teammates. FREE LinkedIn live How to Make Cold Calls to Federal Buyers | A Guide for GovCons In this training, Neil McDonnell explains: How you can push past your resistance to cold calling How many calls it takes to get in...
February 20, 2024
Organizer: GovCon Chamber
Location: Virtual
Add Favorite
Which Agencies 'Love' Black-American Ow...
Not all federal agencies show their support for Black-American owned businesses through their contract dollars. Look at the facts and decide where your business might have more chances for success. FREE LinkedIn live Which Agencies 'Love' Black-American Owned Small Businesses In this training, Neil McDonnell explains: Which federal agencies love 8(a) and minority-owned Small Businesses and by how much? Why should a minority-owned business unde...
February 19, 2024
Organizer: GovCon Chamber
Location: Virtual
Add Favorite
CactusCon 12
Join us at the Mesa Convention Center in lovely Mesa, AZ on February 16-17, 2024 for our in-person event! Talks will be streamed online in case you can’t join us in meatspace. CactusCon is the largest annual hacker and security conference in Arizona. Our last event attracted 2000 attendees from throughout the entire country. Over the last eleven years our event has established itself as a top-tier security conference and has quickly beco...
February 16-17, 2024
Organizer: CactusCon
Location: Mesa, AZ
Add Favorite
SANS San Diego 2024
Conference Description: Learn to combat the world’s latest cyber threats with up-to-the-minute training from real-world practitioners! Make new connections at one of the largest gatherings of professionals in the cyber community this year. Join us in San Diego, CA, or Live Online for SANS San Diego 2024 (Feb 12-17) SANS San Diego 2024 features: In-Person or Live Online training Tactical cyber security training taught by experts wh...
February 12-17, 2024
Organizer: SANS Institute
Location: San Diego, CA
Add Favorite
Cyber Compliance Training Series
10 part Weekly Cyber Compliance Training Series. 30 minutes class followed by 30 minutes Q&A Every Fridays from 12 - 1 EST and cover the following topics: 12-15-23 Module 1: Introduction to Cyber Security Compliance 1-5-24 Module 2: Writing a System Security Plan (SSP) 1-12-24 Module 3: Developing Policies and Procedures 1-19-24 Module 4: Incident Response Planning 1-26-24 Module 5: Preparing for an Audit 2-2-24 Module 6: Reporting to the...
February 16, 2024
Organizer: Lionfish Cyber Security
Location: Webcast
Add Favorite
ATARC Zero Trust Phase 2 Demonstration...
Discover how iboss Zero Trust SSE and Resiliant’s ID Verification technologies collectively address the 13 ATARC Phase 2 scenarios. These solutions embody the principles of the NIST 800-207 Zero Trust Architecture, offering a multifaceted approach to cybersecurity. iboss Zero Trust SSE: By replacing legacy VPN with ZTNA, legacy proxy appliances with Security Service Edge, and legacy VDI with Browser Isolation, the iboss Zero Trust SSE en...
February 16, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Gartner Cloud Security Cookbook: Build...
In today’s digital landscape, cloud security remains a significant challenge. With data often existing beyond our immediate control, ensuring its protection becomes vital. How can organizations effectively safeguard their data when control is limited? Join our experts in this complimentary Gartner cybersecurity webinar as they explore the emerging trends in cloud security, revealing how they can benefit your organization and providing pr...
February 16, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search