Mitigating Cyber Threats in Government...
In this on-demand session attendees learned about harnessing the cloud brings for both opportunities and vulnerabilities. This session pivoted around: Showcasing iboss Azure Cloud Security Gateways and its prowess in mitigating cyber threats in the government sector by providing robust Azure infrastructure security. Seamless connectivity to Azure resources and inter-vnet connectivity. Attendees dove into Azure's functionalities, learned about...
Splunk Compliance Essentials Virtual Workshop
Attendees joined us for a Splunk presentation on the Splunk Compliance Essentials App. This is an app that is free to download from Splunkbase and will assist customers with meeting their government requirements. During this virtual workshop, attendees learned:What Splunk Compliance Essentials can do for their installThe level of customization that can be conducted once installation is doneWhat kind of logs to be collectionsHow to streamline c...
Debunking False Claims on the Cyber Bat...
Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites. While many of these claims were legitimate, others were later debunked, underscoring the importance of verification and validation...
Security and Compliance in 2024: Trends...
A content management system (CMS) is a key piece of the foundation for building modern digital experiences that span farther than just your website today. Global brands such as Mars, Stanley, Black & Decker, NASA and many more have trusted Drupal as their CMS to power their brand differentiating experiences. However, with a rise in cyber attacks, the security of your digital platform is critical. Join us for an insightful conversation with...
DoDIIS Worldwide Webinar Series: Three...
The increasing sophistication of cyber threats, especially those targeting critical infrastructure, has catalyzed a national directive for enhanced cybersecurity measures, as signified by Executive Order 14028. Nation-state actors and other advanced threats are exploiting software supply chains with such efficacy that the integrity of our critical systems is at constant risk. The diverse and complex nature of the software utilized by agencies...
CMMC: A New Year with New Resolutions
This virtual discussion featured Matt Travis, CEO of The Cyber AB – the official accreditation body of CMMC – and an expert panel discussing updates to the CMMC program and key insights on: Perspectives from CMMC ecosystem experts, including perspectives from Matt Travis, CEO of The Cyber AB who will weigh in on the current status of the CMMC rule. Real-world experiences and challenges faced by organizations in adopting the CMMC fr...
Automating Compliance and Security in a...
As technology advances and cyber threats evolve, agencies must strategically adapt their security posture. Attendees came together on January 11 to delve into HashiCorp's advanced automation techniques that can help your agency ensure robust IT security and compliance across platforms. Attendees gained insights into: Understanding the importance of compliance and security automation Exploring HashiCorp Vault, Boundary and Consul to create a Ze...
Bridging the Cybersecurity Talent Gap i...
Navigating the unique challenges of the government and public sector demands a specialized approach to cybersecurity talent. This session will unveil groundbreaking methods, from upskilling your current team to leveraging a pre-vetted cybersecurity talent pool. We'll also explore government-funded cybersecurity training programs to enhance your workforce. Note: There is a way for your partners to also promote and sell bootcamps and talent, but...
Embracing the Future of Cybersecurity:...
Recent years have seen a surge in cybersecurity approaches driven by changes in malicious actor behavior, innovation and the complexity of modern IT enterprises. The expansion of cloud environments in defense agencies emphasizes the need to maximize their value, as relying on a single cloud can hinder innovation, increase costs and limit options for federal applications. Red Hat's Chief Architect and Security Strategist, Michael Epley, session...
Developing a Trade Compliance Program
Developing a Trade Compliance Program Building a Global Compliance Program will teach practitioners how to assess their organization and build a foundational compliance program to mitigate their specific import and export risks. Drawing from guidance from CBP, BIS, DDTC, and the instructor’s own experience, attendees will learn the basics of import and export compliance programs along with best practices and pitfalls to avoid. This cours...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.