Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
December 5, 2024
Organizer:
FedInsider Location:
Webcast
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR). Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to inci...
Accelerate AI with Trusted Data
State and local governments want and need to harness the power of machine learning, AI and generative AI to deliver better constituent outcomes. Yet, they face significant challenges: data silos, lack of collaboration across departments, and limited analytics capabilities – and ensuring compliance with NIST and cybersecurity standards adds another layer of complexity. Join Government Technology and Cloudera for a live webinar to explore...
Building a Protected K-12 Classroom: Cy...
As cyber threats surge, K-12 schools find themselves in the crosshairs of increasingly sophisticated attacks. With limited resources and a growing reliance on connected classrooms and 1:1 device initiatives, defending your school’s data and devices has never been more complex—or more critical. Join the Center for Digital Education and Sophos to explore the latest strategies and solutions specifically designed for the modern, multi-...
Fiscal 2025 End-of-Year IT Buyers Event
The IT federal marketplace is constantly evolving, driven by new products like AI, technological advancements, changing government priorities, and increasing cybersecurity concerns. Join us for our end-of-year event - Shaping the Future of Federal Procurement: Innovation, Policy, and Technology. This event will dive into the findings from our latest hackathon, outline the next steps for streamlining the RFI-RFP process, and provide insights in...
Cybersecurity Challenges of 2025: Uncov...
As technology evolves, so do cyber threats. Join us for a forward-looking webinar on Cybersecurity Trends for 2025, where we explore imminent challenges and innovative solutions in the cybersecurity landscape. Our expert panel will uncover emerging threats, cutting-edge technologies, and strategic approaches that organizations must adopt to stay ahead in the digital race. Stay informed and prepared to protect your digital assets effectively. A...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (C...
Harnessing Automation to Reach Zero Tru...
All federal agencies are working to meet the Office of Management and Budget mandate to establish a zero trust architecture for their systems – a key element in improving cybersecurity across agencies. The National Security Agency (NSA) has laid out the seven pillars of Zero Trust: User, Device, Network & Environment, Application & Workload, Data, Automation & Orchestration, and Visibility & Analytics. In July the agency...
December 9, 2024
Organizer:
FedInsider Location:
Webcast
Gartner Identity & Access Management Summit
Identity management is not just a critical component of cybersecurity; it is the cornerstone of enterprise resilience and agility. Gartner Identity and Access Management Summit 2024 is the premier conference to help IAM and security leaders tasked with safeguarding digital identity, business enablement and organizational security navigate implementing and operating a scalable IAM infrastructure. As you steer your organization through an evolvi...
December 9-11, 2024
Organizer:
Gartner Location:
Grapevine, TX
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.