From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 20, 2024
Organizer:
Zscaler Location:
Webcast
How the State of Vermont Lowers its IT...
You can’t protect what you can’t see. That’s why the Center for Internet Security, NIST’s Risk Management Framework, and countless other leading cybersecurity authorities highlight the pivotal role of visibility in protecting organizations against cyber risk. But public sector organizations’ varied use of technologies, budgets and spheres of ownership can make measuring and lowering cyber risk particularly challen...
How to Make Cold Calls to Federal Buyer...
Is cold calling stopping your government contracting success? Learn to push past your resistance to cold calling,understand the calling metrics, follow scripts and templates that start conversations with federal buyers and teammates. FREE LinkedIn live How to Make Cold Calls to Federal Buyers | A Guide for GovCons In this training, Neil McDonnell explains: How you can push past your resistance to cold calling How many calls it takes to get in...
Which Agencies 'Love' Black-American Ow...
Not all federal agencies show their support for Black-American owned businesses through their contract dollars. Look at the facts and decide where your business might have more chances for success. FREE LinkedIn live Which Agencies 'Love' Black-American Owned Small Businesses In this training, Neil McDonnell explains: Which federal agencies love 8(a) and minority-owned Small Businesses and by how much? Why should a minority-owned business unde...
CactusCon 12
Join us at the Mesa Convention Center in lovely Mesa, AZ on February 16-17, 2024 for our in-person event! Talks will be streamed online in case you can’t join us in meatspace. CactusCon is the largest annual hacker and security conference in Arizona. Our last event attracted 2000 attendees from throughout the entire country. Over the last eleven years our event has established itself as a top-tier security conference and has quickly beco...
February 16-17, 2024
Organizer:
CactusCon Location:
Mesa, AZ
SANS San Diego 2024
Conference Description: Learn to combat the world’s latest cyber threats with up-to-the-minute training from real-world practitioners! Make new connections at one of the largest gatherings of professionals in the cyber community this year. Join us in San Diego, CA, or Live Online for SANS San Diego 2024 (Feb 12-17) SANS San Diego 2024 features: In-Person or Live Online training Tactical cyber security training taught by experts wh...
February 12-17, 2024
Organizer:
SANS Institute Location:
San Diego, CA
Cyber Compliance Training Series
10 part Weekly Cyber Compliance Training Series. 30 minutes class followed by 30 minutes Q&A Every Fridays from 12 - 1 EST and cover the following topics: 12-15-23 Module 1: Introduction to Cyber Security Compliance 1-5-24 Module 2: Writing a System Security Plan (SSP) 1-12-24 Module 3: Developing Policies and Procedures 1-19-24 Module 4: Incident Response Planning 1-26-24 Module 5: Preparing for an Audit 2-2-24 Module 6: Reporting to the...
ATARC Zero Trust Phase 2 Demonstration...
Discover how iboss Zero Trust SSE and Resiliant’s ID Verification technologies collectively address the 13 ATARC Phase 2 scenarios. These solutions embody the principles of the NIST 800-207 Zero Trust Architecture, offering a multifaceted approach to cybersecurity. iboss Zero Trust SSE: By replacing legacy VPN with ZTNA, legacy proxy appliances with Security Service Edge, and legacy VDI with Browser Isolation, the iboss Zero Trust SSE en...
February 16, 2024
Organizer:
ATARC Location:
Webcast
Gartner Cloud Security Cookbook: Build...
In today’s digital landscape, cloud security remains a significant challenge. With data often existing beyond our immediate control, ensuring its protection becomes vital. How can organizations effectively safeguard their data when control is limited? Join our experts in this complimentary Gartner cybersecurity webinar as they explore the emerging trends in cloud security, revealing how they can benefit your organization and providing pr...
February 16, 2024
Organizer:
Gartner Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.