Back to Search Begin New Search Save Search Auto-Notify
Operationalizing the MITRE ATT&CK Frame...
Gain a More Efficient and Effective Cyber Defense with the MITRE ATT&CK Framework Through the use of MITRE ATT&CK, threat intelligence teams can categorize and communicate threats more efficiently to cyber defenders—triggering more effective responses. In this webinar security experts AJ Nash, Director of Cyber Intelligence Strategy at Anomali, and Roberto Sanchez, Senior Director, Threat and Sharing Analysis at Anomali, will dig...
April 29, 2020
Organizer: Anomali
Location: Webcast
Add Favorite
HPE Insights and Solutions for Enabling...
The COVID-19 pandemic has triggered enormous challenges for government IT, which must support a growing demand for a remote workforce to continue operations while responding to public health and welfare concerns. HPE and Aruba have mobilized the full weight of our respective resources and eco-system of partners to provide technology, solutions, expertise and support to help our government customers with these challenges. Join this webinar and...
April 28, 2020
Organizer: HPE
Location: Webcast
Add Favorite
Controlling Chaos - Are you prepared fo...
The finish line for every IT security team is Breach Defense: keeping attackers from accessing devices and data. But there is never enough time to respond to every alert, and simply understanding what has happened—or should have happened—across your security tools can take hours.In this webinar you’ll see how Cisco can help your agency leave those challenges behind.
April 21, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Microsoft Healthcare Partner Showcase
Driven by the need to reduce healthcare costs, improve patient outcomes, boost the engagement of patients, and enhance the experiences of both patients and healthcare professionals, the need for healthcare to innovate has never been greater. Join us in this webinar as we showcase key healthcare partners of Microsoft, to learn about their focus, their solutions and services, use of Azure and Dynamics 365, and how they are leveraging the Microso...
April 17, 2020
Organizer: Microsoft
Location: Webcast
Add Favorite
Why Lead with Risk? Defining a Risk-Bas...
Effective governance requires a proactive approach. So when creating a cybersecurity strategy, it’s best to address the primary issue–risk–head on. Watch this webcast to learn: How to define cybersecurity success Steps you can take now to help avoid compliance issues later Common approaches that fall short
April 1, 2020
Organizer: Forcepoint
Location: Webcast
Add Favorite
Protect Ransomware's Next Target - Backups
Ransom-Free, Rapid Recovery of Immutable Data. Ransomware attacks are accelerating at unprecedented rates, morphing their variants to evade detection, and are now successful targeting your last line of defense – backup copies. End the Extortion. Join our industry experts for a threat briefing and the latest countermeasures being deployed to insulate and rapidly recover critical data – helping you neutralize the most crippling of ex...
March 31, 2020
Organizer: Pure Storage
Location: Webcast
Add Favorite
CMMC Made Easy (webinar recording now online)
* If you missed the live session, visit the GovCon Chamber of Commerce to watch the recorded webinar free. https://www.govconchamber.com/cmmc The GovCon Chamber of Commerce welcomes leading government and small business experts to discuss what your business must do to become CMMC cybersecurity compliant. This panel is designed to help eliminate the intimidation and rumors involved and get you on the path to success. FREE WEBINAR | REGISTER TOD...
March 20, 2020
Organizer: GovCon Chamber of Commerce
Location: Webcast
Add Favorite
Social Re-Engineering for Your Employees
Join us to learn how continuous, data-driven training can turn your employees from insider threats to cyber warriors. If your agency spends significant budget and resources on deploying firewalls, secure data storage, and email security technologies, a single click by an employee on a malicious email can render all these systems useless. With email still being the entry point for most data breaches (96%), the human factor continues to be the m...
September 10, 2019
Organizer: CybeReady Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
2019 State of the Phish Report
2019 State of the Phish ReportPhishing continues to be the number one attack vector. Why? Because it works — all too well. Industries of every kind fall prey to these scams — from financial organizations to government contractors to healthcare firms. Today’s cybercriminals manage to evade even the most sophisticated security technology through carefully planned, socially engineered email attacks that are only getting more adv...
May 23, 2019
Organizer: AFCEA International
Location: Webcast
Add Favorite
Transforming Medical Universities With...
The cloud is key to transforming & modernizing IT and cybersecurity for Medical Universities across the country. Cloud computing enables public sector and higher education organizations to carry out their missions with increased speed, scale, and agility. We will discuss how we are solving complex security issues with data, continuous monitoring, protection and early warning. This webinar, “Transforming Medical Universities with Clou...
March 27, 2019
Organizer: CrowdStrike
Location: Webcast
Add Favorite
Back to Search Begin New Search