Back to Search Begin New Search Save Search Auto-Notify
Building a Robust Threat Management System
The U.S. government ranks near the top of the global target list for hackers, and threats have become increasingly sophisticated. Federal executives are expected to protect their assets from millions of threats each day. As attacks have become more sophisticated, so have defenses. And cybersecurity is at the top of the priority and funding list across all areas of government. This FCW workshop brings together government and industry to discuss...
March 13, 2019
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
CDM @ RSA: Transformation Beyond the Pe...
Cyber talent shortage, rapidly evolving threats, and unique agency policies are every day security challenges for today’s government cyber professionals. DHS’s CDM program provides light at the end of this long tunnel of challenges. The CDM program is now on the cusp of transforming the way government does business by making Federal agencies more AWARE of their total cyber risk with a new enterprise dashboard capability. The progra...
March 4, 2019
Organizer: MeriTalk
Location: San Francisco, CA
Add Favorite
SANS Reno Tahoe 2019
Develop much-needed skills to protect against today's cyber-attacks. Join us for SANS Reno Tahoe 2019 (February 25-March 2), and get hands-on training needed to sharpen your skills and accelerate your cyber security career. SANS is recognized around the world as the best place to develop the deep, hands-on cyber security skills most needed right now. Register today for immersion training that will provide you with the skills to defend your org...
February 25 - March 2, 2019
Organizer: SANS Institute
Location: Reno, NV
Add Favorite
LIVE NATION'S SOLD-OUT TOUR -- THE ROAD...

CANCELED

Join us for a fireside chat with Live Nation Entertainment to talk about how they’ve implemented Zero Trust to improve their security posture. Torsten George sits down with Kris Howitt to chat about: Why old school mentality of security no longer worksHow to get buy-in from key stakeholders on implementing Zero Trust PrivilegeVendor selection process and key capabilities to look forResults and benefits achieved (e.g., meeting PCI DSS...
February 28, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
CDM & Eggs
From DEFEND and .govCar, to the RFS process and AWARE, the CDM program constantly evolves to meet the cybersecurity needs of Federal agencies. And with growing concerns around cloud and security, the CDM program will expand its capabilities beyond the perimeter in FY19. Join MeriTalk and Federal cybersecurity experts on February 21 for the CDM & Eggs government-only roundtable breakfast to discuss the path forward for CDM program in FY19 a...
February 21, 2019
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Security Innovation in the Cloud
With cybersecurity at the forefront of urgent government IT issues and most federal agencies having some presence in the cloud, now is the time to consider if your agency is as cloud-secure as possible. Do you have full visibility of cloud assets? Automated security testing and remediation? Rapid mitigation of threats? How is the growth of IoT and other emerging technology complicating security plans? This event brings together government and...
February 21, 2019
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Debunked: 5 Myths About Zero Trust Security
In 2018, Zero Trust Security gained popularity due to its simplicity and effectiveness. Yet despite a rise in awareness, many organizations still don’t know where to start or are slow to adopt a Zero Trust approach. The result? Breaches affected as many as 66% of companies just last year. And as hackers become more sophisticated and resourceful, the number of breaches will continue to rise - unless organizations adopt Zero Trust Security...
January 31, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Does Your Password Vault Do This?
Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions: Brokering of identitiesMFA enforcementJust-enough privilege
January 24, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
SANS Sonoma 2019
The cyber security industry needs skilled practitioners! Whether you are a veteran in the field or you are just starting your career, it is imperative to continually develop and sharpen your skill set to stay ahead of the adversaries seeking to harm your environment. SANS training goes beyond theory, incorporating real-world examples and practical techniques you can apply directly to your work. At SANS Sonoma 2019 (January 14-19), get the trai...
January 14-19, 2019
Organizer: SANS Institute
Location: Santa Rosa, CA
Add Favorite
Washington Technology DHS Industry Workshop
Getting New Solutions into CDM DEFEND The Dynamic and Evolving Federal Enterprise Network Defense (DEFEND) task orders are designed to bring more flexibility to the Continuous Diagnostics and Mitigation Program. Agencies can now tailor implementations to meet their specific mission requirements, while vendors can continuously bring new solutions into the CDM program -- *if* they go about it the right way. This Washington Technology / FCW event...
December 14, 2018
Organizer: 1105 Media Public Sector Events
Location: Vienna, VA
Add Favorite
Back to Search Begin New Search