Back to Search Begin New Search Save Search Auto-Notify
Meeting the Requirements of the Preside...
President Biden recently signed Executive Order 14028 - "Improving the Nation's Cybersecurity" mandating cybersecurity improvements across the Department of Defense and the intelligence community. With the goal of modernizing cybersecurity defenses and protecting federal networks, this new mandate gives identity teams an aggressive timeline for delivering Zero Trust Architecture and other key initiatives. Join Radiant Logic on Thursday, March...
Add Favorite
Prioritized Remediation for CMMC Compli...
Cyturus Technologies, Armis, and Carahsoft have assembled a panel of seasoned industry veterans and innovators to demonstrate proven methods for assisting your organization in identifying managed and unmanaged assets, devices, and software, measuring specific risks, and then creating systems and processes for enforcement automation, threat alerting, and prioritized remediation actions. During this webinar you will learn how to: Practically app...
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
More Channels, More Problems: Is Your T...
Students expect their university to provide digital experiences with improved levels of personalization, efficiency and ease-of-use. To meet those demands, school's need to determine which of their current digital solutions are effective and useful, and which are due for a reevaluation. Join Acquia and Mediacurrent experts online as they discuss the higher education technology landscape and the most effective ways to deliver enhanced student e...
Add Favorite
Understanding CMMC Requirements for Hig...
Join Jamie Marshall, Scott Friedman, and Steve Bond, as they discuss: What is included in the November 2021 release of CMMC 2.0 How CMMC impacts educational organizations and why you need to take action How to assess your organization’s readiness to meet CMMC requirements What a CMMC Audit entails and how to prepare your organization to pass An overview of AWS and CloudHesive tools that help you meet your CMMC challenges
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
4 Ways to Expand Accessibility to Onlin...
Are you looking for a way to give the elderly, poor, and rural residents access to your online meetings? Join this complimentary webinar to discover the four main accessibility challenges with online meetings and how to address the uniqueness of each challenge. Specifically, this session will cover: The cost, risk, and impact of not addressing accessibility challenges with online meetings The statistics around the size of the accessibility iss...
Add Favorite
Mission First: DoD and National Securit...
Tune in to be the first to hear our podcast dedicated to covering the latest and greatest in IT advancements - keeping you ahead of the competition. Attendees will hear from Keith Nakasone, former deputy assistant commissioner of acquisition management within the information technology office at the General Services Administration's Federal Acquisition Service and Federal Strategist, VMware and Craig Bowman, Sr. Director - Federal, VMware, who...
Add Favorite
Software Supply Chain Risk Management f...
Mobile application security is a real threat vector. Whether managing existing mobile apps or building your own, the need to test for vulnerabilities on a regular basis is more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd-party created apps, is a diffic...
Add Favorite
Migrating to Splunk IL5 Cloud
Splunk Cloud Platform™ delivers the capabilities of Splunk as Software-as-a-Service (SaaS), enabling you to make confident decisions and take decisive action on insights from your data without the need to purchase, manage, and deploy additional infrastructure. Ensure fast time to value, security, and reliability by outsourcing your infrastructure management and admin tasks to Splunk, so your employees can focus on core, high-priority act...
Add Favorite
Back to Search Begin New Search