Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Can Mobile Security & Privacy Coexist?
State and Local Governments face heightened cybersecurity risks due to their critical role and resource constraints. Attendees joined Quokka experts on July 30th as they explore common security weaknesses found in mobile apps. Hear strategies that can strengthen your mobile security and mobile app development. Attendees registered to:Identify common mobile app security weaknesses and how they can be leveraged to extract valuable dataNavigate t...
Add Favorite
Fortifying The Expanding Role Of The Fe...
In the last five years, OMB and CISA have been expanding the role of Federal cybersecurity programs beyond traditional IT. As the threat has expanded deep into software supply chain, third-parties, IOT/OT and cryptography, understanding where to focus has become more difficult and resource intensive. The CISO and their staff constantly balance mission priorities with zero trust goals, audit findings and modernization efforts while continually...
Add Favorite
Strengthening Cybersecurity and Digital...
Across the nation, Government agencies are redefining digital interactions with the public. They’re modernizing systems and apps to improve service quality and speed. They’re developing a single, secure account for frustration-free access to everything. Yet, building strong digital relationships with the American public shouldn’t come at their expense. Neither should it come at the cost of your mission-critical applications....
Add Favorite
Transforming Pension Security: A Human-...
State and local government pension systems administrators have the important responsibility of ensuring strong security measures with seamless user experiences in a time of growing digital threats and ever-changing cybersecurity challenges. Attendees joined this webinar to see how advanced data analytics and better digital identity verification made possible by Splunk and ID.me can completely change the way pension programs protect and operate...
Add Favorite
How to Automate, Orchestrate, and Secur...
Attendees of this webinar explored how BigFix leverages AI to:Improve employee experience using Gen AIAutomate infrastructure managementSecure and manage endpoints across nearly 100 operating systemsEnsure continuous complianceEnhance vulnerability management with award-winning cybersecurity analytics
Add Favorite
A New Paradigm for Managing Third-Party...
The MOVEit and GoAnywhere attacks in 2023 ushered to the forefront the importance of having a viable and adaptive third-party risk strategy. If there had ever been the feeling that third-party risk was a secondary stakeholder in the cybersecurity space, the importance of which was elevated only for short periods of time during a crisis, these two attacks shattered that notion entirely. This new reality has compelled security strategists to rap...
Add Favorite
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Add Favorite
Carahsoft's CMMC Webinar Series - CMMC...
Wiz and Carahost hosted a webinar which covered an introduction to Cloud Native Application Protection Platform (CNAPP) and alignment with key CMMC controls. In this webinar we covered:The importance of DIB cybersecurity and safeguarding cloud workloads supporting the DIB, government agencies and warfightersBridging the divide between DIB security professionals and software developersWiz mapping & alignment with the key CMMC controls Minim...
Add Favorite
Automated Policy Enforcement for CMMC w...
CMMC is an important program for hardening the cybersecurity posture of the defense industrial base, yet implementation can be a challenge for teams unfamiliar with automating compliance measures. Attendees joined Anchore experts on August 27th for a webinar that explored the evolving areas of CMMC and SSDF compliance parameters. During this webinar, we demonstrated how Anchore Enterprise can help your agency:Implement and automate compliance...
Add Favorite
Empowering Federal Cybersecurity: Imple...
Attendees joined OffSec for a webinar to learn how implementing skills-based hiring for cybersecurity roles in the federal government poses several challenges. First, there's the issue of standardizing assessment methods across agencies. Unlike traditional practices relying on education and experience, skills-based hiring requires reliable tools like simulations and practical tests to assess competencies accurately. Ensuring uniformity across...
Add Favorite
Back to Search Begin New Search