Back to Search Begin New Search Save Search Auto-Notify
ISMG Roundtable Dinner- Secure Your Ide...
Insider threats are back and broader than ever – growing more than 44% over just the past two years. Once manifesting mainly as malicious attacks against an organization, insider threats now are commonly the result of accidents or external compromise. And just as commonly, these threats prey upon access to your critical systems and data. Which are the predominant insider threats against your organization? How are they picking away at yo...
February 20, 2024
Organizer: Information Security Media Group (ISMG)
Location: Washington, DC
Add Favorite
The Gartner 100 Data & Analytics Predic...
Data and analytics is crucial to a successful digital business across nearly all industries, business functions and IT disciplines, in both the private and public sectors. Yet, for many, data-centric thinking remains difficult. The transition to data-driven business requires data and analytics leaders, including chief data and analytics officers (CDAOs), CEOs and CIOs, to design data and analytics strategies that advance a new vision of busine...
February 20, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Leverage the Combined Power of SonicWal...
Strengthen your security posture, safeguard the data, and streamline workflows for heightened efficiency with powerful integration! In this key session live demonstrations showcase the combined power of these three great solutions. Industry experts share important insights improving your information’s security and safety. Join us to explore how the seamless integration of these robust solutions significantly elevates your protection and...
February 20, 2024
Organizer: SonicWall | Auvik | Lionguard
Location: Webcast
Add Favorite
The Odd Couple: Why a DBA Joined a (Pur...
Who knew that the best coffee break conversations would end up happening online? Each month, Pure’s Coffee Break series invites experts in technology and business to chat about the themes driving today’s IT agenda - much more ‘podcast’ than ‘webinar’. This is no webinar or training session—it’s a freewheeling conversation that’s as fun as it is informative and the perfect way to break up yo...
February 20, 2024
Organizer: Pure Storage
Location: Webcast
Add Favorite
NASA Splunking into Zero Trust
Join us to explore how Splunk can empower NASA's Zero Trust (ZT) initiative and strengthen its security framework. Splunk's cutting-edge technology seamlessly reinforces the "cross-cutting capabilities" outlined in CISA's Zero Trust Maturity Model, covering vital elements such as enhanced visibility and analytics, efficient automation and orchestration, and robust governance. Splunk efficiently integrates these technologies to offer a compreh...
February 20, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Exclusive Event for Ohio Public Servant...
Does your agency need more constituents to be aware of initiatives or programs without adding additional staff? Are there groups of people you are struggling to connect with the right services? Would you like to reduce costs and save time by sending personalized emails and SMS messages to millions at a time? Join Granicus communication and engagement experts on Tuesday, February 20 at 10 a.m. ET for a look at how an integrated, personalized co...
February 20, 2024
Organizer: GRANICUS
Location: Webcast
Add Favorite
How the State of Vermont Lowers Its IT...
In today's dynamic cybersecurity landscape, visibility is paramount, particularly for public sector organizations. Vermont leads the way with risk management dashboards, offering real-time insights into cyber risk across all departments. Join us Tuesday, February 20 to hear from the state IT leaders who oversaw Vermont’s risk dashboard adoption process and discover tips for other states, cities, or counties on using risk dashboarding to...
February 20, 2024
Organizer: Tanium Government Team at Carahsoft
Location: Webcast
Add Favorite
How the State of Vermont Lowers its IT...
You can’t protect what you can’t see. That’s why the Center for Internet Security, NIST’s Risk Management Framework, and countless other leading cybersecurity authorities highlight the pivotal role of visibility in protecting organizations against cyber risk. But public sector organizations’ varied use of technologies, budgets and spheres of ownership can make measuring and lowering cyber risk particularly challen...
February 20, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Cyber Compliance Training Series
10 part Weekly Cyber Compliance Training Series. 30 minutes class followed by 30 minutes Q&A Every Fridays from 12 - 1 EST and cover the following topics: 12-15-23 Module 1: Introduction to Cyber Security Compliance 1-5-24 Module 2: Writing a System Security Plan (SSP) 1-12-24 Module 3: Developing Policies and Procedures 1-19-24 Module 4: Incident Response Planning 1-26-24 Module 5: Preparing for an Audit 2-2-24 Module 6: Reporting to the...
February 16, 2024
Organizer: Lionfish Cyber Security
Location: Webcast
Add Favorite
Gartner Cloud Security Cookbook: Build...
In today’s digital landscape, cloud security remains a significant challenge. With data often existing beyond our immediate control, ensuring its protection becomes vital. How can organizations effectively safeguard their data when control is limited? Join our experts in this complimentary Gartner cybersecurity webinar as they explore the emerging trends in cloud security, revealing how they can benefit your organization and providing pr...
February 16, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search