Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
QSMO and CDM Webinar
The Evolution of How Cybersecurity is Delivered as a Shared Service Join Palo Alto Networks for a virtual fireside chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) & Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies. Hear how...
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Modernizing DoD's Approach to Security...
The Department of Defense (DoD) is considering how to best leverage zero trust architecture (ZTA) to move away from the traditional network-centric security model. By shifting to a modern, resource-centric framework, agencies are better able to focus on protecting data and critical resources. During this webcast, we’ll explore how a cloud service provider, such as Zscaler, can help transform the DoD's existing cybersecurity platform with...
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
Recovering from a Destructive Cyber Attack
Threat actors continue to develop better, more advanced tactics to encrypt your organization’s data for ransom, destroying backups along the way to ensure their payday. There are many tools, capabilities and techniques to build resilience to counter these threats, but there are few standards to help. How do you know what to do and whether it will actually protect you? Please join Jim Clancy—SVP, Global Data Protection Sales and Jim...
Improving K-12 Cybersecurity
Do you know what the number one risk is to a K-12 institution's cybersecurity posture and sensitive data? – Your own users! The sudden shift to remote learning has put an even larger target on the back of K-12 education institutions. When it comes to data breaches, the most prevalent path in is through compromised credentials. For this reason, the traditional perimeter is no longer sufficient and districts must take an identity-centric a...
Cost Efficient Cybersecurity in Higher...
Attendees joined us to learn how TekStream is helping higher education institutions strengthen their cybersecurity posture in an era of accelerating threats and rapid technological change.Attendees gained insight on:Find a sponsor for your project and build a teamIdentify what you are already doing, and what more can be doneVerify what compliance standards must be metEvaluate best in-house and out-sourcing options/vendorsStart the selection process
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.