119 webcasts found
+ 3225 past events found
Back to Search Begin New Search Save Search Auto-Notify
Seal the Cracks: Strategic Supply Chain...
In this webinar Archer and Carahsoft addressed the escalating challenges posed by supply chain cybersecurity risks in government networks. This webinar dove into: Understanding common supply chain and third-party risks. Proactively addressing and mitigating supply chain attacks to bolster organizational defenses. Leveraging NIST 800-171 best practices to fortify software supply chains against vulnerabilities. Exploring NIST NCCoE supply chain...
Add Favorite
Ensuring Reliability: A Guide to Testin...
We understand that critical errors and broken dashboards can occur at any time, posing significant risks to your business operations, especially during migration or upgrade processes. Our expert-led session provided attendees with practical strategies and techniques to mitigate these risks effectively. This webinar dove into into the crucial aspects of testing, certifying and building trust in your Tableau dashboards. During this webinar, atte...
Add Favorite
Automated & Continuous Security Complia...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Attendees joined us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public s...
Add Favorite
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
Add Favorite
Cost Saving Measures for Federal Agenci...
In this session, we highlighted: Understanding the current cost-saving landscape for federal agencies in 2024. Practical strategies for identifying and eliminating inefficiencies within risk and security teams. Exploring the role of technology in driving cost savings and efficiencies. Real-world case studies and success stories of federal agencies implementing cost-saving measures. Actionable steps to implement cost-saving measures while maint...
Add Favorite
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Attendees joined for a strategic session that delves into the essentials of the Risk Managemen...
Add Favorite
Modernizing Mission Access (CEU Approved)
Join us for a special webinar series hosted by SIGNAL Media and Everfox. Submit one registration and gain access to up to four sessions covering topics ranging from modernizing mission access to best practices for government AI adoption, mitigating insider risk and more. First up in the series: Modernizing Mission Access. Approved for 1 GIAC CPE and 1 CompTIA CEU for A+, DataSys+, Network+, Security+, Linux+ and Cloud+. Modern missions require...
Add Favorite
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. This webinar explored the intricate and powerful combination of Zero Trust and insider risk management! During the session, our speakers:Identified challenges and solution...
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
Add Favorite
Steering Through Complexity: Grasping C...
Attendees of this webinar joined Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. The speakers dove into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 1402...
Add Favorite
Back to Search Begin New Search