Virtual Summit: IoT & OT Security Summit
ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges. Highlight TopicsThe Art and Science of Translating Cyber Risk and Loss Exposure Into Quantifiab...
Breakfast Buzz: Elevating User Experien...
As geopolitical and global threats continue to evolve, the DOD's employees and warfighters demand IT and digital solutions that are performant, adaptable, and aligned towards mission success. The symbiotic nature of end users, technology, and mission parameters demands data-driven decision making when it comes to IT service delivery. During this breakfast event, join Riverbed and incredible DOD leaders as we highlight how key digital tools and...
December 5, 2024
Organizer:
GovExec Location:
Arlington, VA
AI and Analytics: Answering Healthcare'...
Unlock the power of advanced analytics with IPC Global and Qlik by joining our upcoming Healthcare Webinar Series. This carefully curated set of sessions focuses on key areas transforming your healthcare systems, from healthcare research and population health to grants management, supply chain optimization, and AI-powered operations. Whether you're looking to enhance decision-making, streamline operational processes, or modernize your work...
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
December 5, 2024
Organizer:
FedInsider Location:
Webcast
FAS and Buy.GSA.Gov Overview
GSA Events offers a wide variety of training opportunities for your agency. The training is free, and you can earn Continuous Learning Points (CLPs) for attending all classes. With these recurring training opportunities, GSA provides overviews of acquisition support that is available to our federal customers and Military! All developed to make your acquisition work easier and more efficient while achieving cost savings! Mark your calendar righ...
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way. Join CyberArk and Optiv + ClearShark's leaders on December 5th as they share insights and "confessions" into implementing Zero Trust security principles, emphasizing that it...
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR). Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to inci...
The Low-Down: Network & Cloud Security...
Join Juniper Networks & Carahsoft for an informative webinar where we will explore the critical aspects of network and cloud security for SLED organizations. Learn how to design and implement robust security measures to safeguard your sensitive data and systems. In this webinar, attendees will hear Juniper SME's discuss:Introduction to Network and Cloud Security: Gain an understanding of the importance of a well-designed security architect...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (C...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.