181 webcasts found
+ 3470 past events found
Back to Search Begin New Search Save Search Auto-Notify
Navigating Cybersecurity in the Defense...
Attendees joined Quzara and Carahsoft on April 25, 2024 for a critical discussion on the evolving threat landscape, practical defense strategies, and the intricate web of regulatory compliance shaping the future of defense cybersecurity. Attendees experienced: Expert Insights: Attendees heard from a distinguished panel, including voices from Microsoft's Defense and Aerospace teams and the DOD DC3 Crime Center. Real-World Solutions: Attendees d...
Add Favorite
Forescout Webinar: Building Cyber Resil...
The rising use of Industrial IoT devices in critical infrastructure networks increases risks by connecting OT and IT systems, making critical processes more vulnerable. Lack of visibility into OT networks hinders OT organizations from assessing breach impacts on IT networks, leading to costly shutdowns. Fortunately, eyeInspect is now free for anyone in the DOD through Comply-to-Connect (C2C). In this User group webinar hosted by Carahsoft wher...
Add Favorite
Roadmap to DoDD 8140.03M Compliance: A...
With the release of new DoDD 8140.03M, compliance remains a top concern for agencies. In a dynamic and rapidly changing cyber landscape, it's never been more important to stay ahead of the curve. While it’s no easy task to navigate, early implementation and strategic planning are critical to the nation’s security. WillCo Tech offers trusted cybersecurity expertise management, equipping the DoD workforce with the largest cybersecuri...
Add Favorite
Navigating CMMC Compliance: The Integra...
The recent notice of proposed rulemaking for the Cybersecurity Maturity Model Certification (CMMC) program made one thing for certain: the U.S. Department of Defense is serious about external service provider (ESP) security. Under the proposed regulation, U.S. defense contractors will need to pay close attention to their Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) who qualify as ESPs to ensure they also achi...
Add Favorite
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Add Favorite
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore th...
Add Favorite
Fortifying the Frontlines: Mastering Cy...
As cyber threats continue to evolve, so does the need for a sophisticated approach to managing the cybersecurity workforce and ensuring compliance within DoD and federal agencies. This webinar explores how DefenseReady by Permuta provides integrated solutions that not only streamline workforce management but also enforce rigorous security protocols, ensuring that your agency remains both effective and compliant in a landscape of increasing cyb...
Add Favorite
Security, Observability, Cloud Developi...
Splunk and MBL Technology dove into Splunk strategies for new and existing customers in the Federal government. Learn more about Splunk’s suite for Cyber Security, Compliance, and Observability. Splunk is the leader in security and observability, providing enterprise visibility and insights across IT stacks with extensive past performance across the entire DOD and Civilian Government. Our existing customers are migrating to the cloud, bu...
Add Favorite
Back to Search Begin New Search