Achieving CMMC Compliance: Ensuring Dat...
Thank you for your interest in our Rubrik CMMC webinar: Achieving CMMC Compliance: Ensuring Data Protection & Cyber Resilience with Rubrik Attendees of this webinar heard from Bill Hackley, Federal Sales Engineering Manager at Rubrik, about the essential aspects of CMMC compliance and how Rubrik can help organizations meet CMMC standards through:Advanced data protectionData managementEnhancement of cybersecurity measures
Meet the Presidential Cybersecurity Man...
Watch this on-demand webinar designed to empower federal agencies to achieve the cybersecurity goals outlined in the latest presidential mandate. Discover how RSA's newly FIDO2-certified authenticator app can transform your agency's security infrastructure. Learn how the RSA authenticator app can help federal and other government agencies defend and modernize key infrastructures, enhance and scale collaboration between public and private secto...
Safeguarding State, Local and National...
In today’s landscape of increasingly sophisticated cyber threats, safeguarding state, local and national security is more crucial than ever. Proofpoint and Carahsoft are thrilled you attended our webinar. We explored how the Cybersecurity Maturity Model Certification (CMMC) can enhance your security posture and how Proofpoint’s state-of-the-art impersonation protection can be a key component in this effort.Thank you for joining us...
TDTM: Enhancing Federal Data Security:...
This webinar was designed for federal IT professionals seeking to move beyond conventional backup solutions and adopt comprehensive cyber resilience frameworks. Our experts covered topics such as immutable data, AI-driven threat detection, and rapid, secure recovery processes.Attendees learned about:Insights into the limitations of traditional backup methods.Techniques for integrating cybersecurity with data protection.Strategies for implement...
Building Student-Led SOCs in Higher Education
Higher Education Security Teams are often understaffed, underfunded, and at greater risk for cybersecurity threats. While many schools recognize the potential of student internships from their Cybersecurity programs, they often struggle with the management and training required to integrate these students into their Security Teams. This webinar showcased how LSU formalized its Student Led SOC program to create a framework that trains students...
Turning Real-Time Data Into Action for...
Attendees joined us and learned how real-time data analysis can help institutions gain fuller insights into cybersecurity posture, IT and HPC systems operations, public safety and student well-being. Attendees also explored sustainability and Wi-Fi optimizations use cases. For example, real-time data can enable risk-based alerting, so staffers are not overwhelmed with security alerts that aren’t important. In addition, many institutions...
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Transform Fraud Prevention: From Legacy...
Federal finance administrators face the critical challenge of balancing strong security with seamless user experiences amid evolving cybersecurity threats. This webinar explored how Splunk and ID.me's advanced data analytics and digital identity verification can revolutionize pension program security and operations. Experts discussed human-centered design strategies that enhance fraud prevention while ensuring frictionless services access. Dur...
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
From Compliance to Leadership: How CMMC...
On October 10th, our distinguished panel explored how organizations can leverage CMMC (Cybersecurity Maturity Model Certification) not only to meet compliance requirements but to elevate their long-term security leadership. By gathering insights from top experts across industries, the panel demonstrated how CMMC acts as a catalyst for building a more mature and resilient security posture, enabling businesses to lead confidently in the face of...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.