Container and Kubernetes Security Best...
Conducting forensics and incident response for containers and Kubernetes helps you better understand security breaches, meet compliance requirements and recover quickly. On average, containers live less than 5 minutes, so having a cloud native incident response plan is critical.In this webinar we’ll cover: Detecting threats using security frameworks like MITRE Best practices to streamline your incident response workflow in container and...
GPS Spoofing | History and Prevention
Low signal strength, open specifications, and advances in software defined radios have made imitating GPS and other satnav systems within the grasp of relatively unsophisticated bad actors. Mr. Goward will discuss the rapid development of GPS signal deception over the last ten years and what receiver manufacturers and the US government are doing about it.
Taking Security from Intelligence to De...
There has been much ado about extended detection and response (XDR) and its promise to solve long-standing problems in security. Security teams need an integrated awareness, detection, and response capability that starts with actionable, relevant, prioritized intelligence. Many organizations are considering an XDR implementation but are eager to understand how XDR helps them achieve a higher level of resilience against mounting security threat...
TECHEXPO Polygraph-Only Virtual Hiring Event
Interview with leading Defense Employers at the first Hiring Event of 2022! TECHEXPO Polygraph-Only Virtual Hiring Event Thursday, January 13th 12pm - 4pm EST A CI, Lifestyle or Full Scope Polygraph Clearance is Required to Attend. Register to Attend: https://techexpousa.com/event/poly-011322/ Enter Registration Code EC22 Speak directly to recruiters and ask questions via text or video chat. Please invite your polygraph-cleared friends ...
DoD: Digital Modernization Forum
The Department of Defense continues to make digital transformation strides through modernization measures such as its Joint Warfighter Cloud Capability and Cybersecurity Maturity Model Certification programs. In the evolving defense landscape, DoD agencies are currently working to modernize across areas including acquisition, engineering, data sharing and cybersecurity. Join GovCon Wire Events’ DoD: Digital Modernization Forum to hear em...
January 13, 2022
Organizer:
GovCon Wire Location:
Virtual
Your Extra Layer of Security: Getting t...
Maintaining trust in a network has become an enormous challenge due to: an increasingly sophisticated cyber threat landscape an expanding digital infrastructure a mushrooming cybersecurity skills gap, and an increased need to secure remote work In addition, the growing remote workforce needs to access both cloud-based and on-premises infrastructures. Zero trust network access needs to include controls and policies for network segmentation, end...
Navigating the Healthcare Roadmap: From...
The North Carolina chapter is excited to host our annual conference in person! Navigating the Healthcare Roadmap: From the Mountains to the Sea, at the Embassy Suites Charlotte-Concord Golf Resort, January 11 & 12, 2022. Join us for this opportunity to learn from and network with healthcare IT professionals to inspire innovation and improve healthcare delivery and technologies throughout the state. CME, CNE, CPE, CPHIMS credits will be off...
ICS Cyber Resilience, Active Defense ...
Join members of the SANS Industrial Control Systems (ICS) Team in a new ICS Webcast Series: ICS Cyber Resilience, Active Defense & Safety. Presenters will address the recent increase in attack campaigns and impacts seen across multiple sectors in the ICS space. Topics of discussion will include ransomware impacting critical infrastructure, detecting advanced adversaries inside ICS networks, and a variety of other threats and defenses. This...
DevSecOps and Application Threat Landsc...
Over the past few years, we have seen drastic, but welcome, changes in how organizations manage their own software and code. Organizations are embracing security at the code level, encouraging developers and security teams to work closely together. Giving way to the term “DevSecOps”, developers now integrate automated processes to build and ship code, streamline the development cycle, and ship code more securely. However, cyber adv...
Putting the MOD back into IT Modernizat...
Join Deputy Federal CIO Maria Roat, OPM CIO Guy Cavallo, and Commerce’s Bureau of Industry and Security CIO G. Nagesh Rao on January 11 at 12pm ET for a panel discussion moderated by Melvin Brown II, OPM’s Deputy CIO. Our discussion will center on “Putting the MOD back into IT Modernization” as well as reflected learnings and the next evolution of the President’s Management Agenda and Executive Orders around: Elev...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.