Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
Keep Device Data Safe with Secure Erase
Embedded devices today are used to store a wide variety of data. While some of that stored data is inherently secure – possibly through encryption or encoding – not all designs provide a secure data removal option. For magnetic media, the data must be both erased AND overwritten – only then is the data securely deleted from the drive. Is this sufficient or overkill for NAND media? In this webinar you will learn: The importanc...
December 12, 2022
Organizer:
Tuxera Location:
Webcast
The State of Encrypted Attacks: What's...
A vast majority of today's attacks use encryption to bypass defenses. Zscaler's ThreatLabz team analyzes data from the world's largest security cloud, processing over 250 billion transactions per day, to uncover what threats are hiding in SSL/TLS. Join this webinar to learn and discuss how encrypted attacks are evolving, including: The fastest growing threat types The most targeted industries/geographies Where most enterprise defense strategie...
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
Enabling True PIV/CAC Encryption for Em...
Email communication is a constant function of every agency, but strong encryption is a now a necessity. The PKI certificates needed to implement end-to-end encryption are already available to government employees and contractors using CAC, PIV, and PIV-I smartcards. However, agencies deliberately avoid large scale use of end-to-end encryption due to the difficulty of implementation and the need to decrypt encrypted email messages for authorize...
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
Anatomy of a Ransomware Operation
Ransomware attacks are no longer “drive-by” events. Encryption is only one of the problems among a list of others that include operational disruption and data exfiltration for extortion, ransom, sale, and re-sale. Join SANS Senior Instructor Jake Williams, SANS Instructor and BlackBerry Principal Incident Response Consultant Ryan Chapman, and BlackBerry Most Distinguished Threat Researcher Dmitry Bestuzhev as they dissect and anal...
The Quantum Security Challenge
Quantum computing is advancing rapidly, and its impact is likely to be large—their potential computational power that could render today’s encryption algorithms obsolete. To address this looming threat, the White House issued a National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems (NSM 10) this May. The NSM 10 fact sheet states that ...
August 25, 2022
Organizer:
ATARC Location:
Webcast
Defending Sensitive Government Data Aga...
Government contractors are increasingly a prime target for cyber-attacks, ranging from phishing and social engineering to malware and ransomware. Cloud computing, remote working and traffic encryption expand the attack surface while making threats harder to detect. How do we improve our network security in the face of these challenges? Network detection and response solutions can help detect potential breaches and prevent attackers from disrup...
Ansible Security Policy Automation Workshop
Who is this workshop best for? This workshop is a hands-on introduction to using Red Hat® Ansible® Automation Platform® for technical professionals responsible for implementing and deploying security policies across their technology domain. An understanding of Ansible terminology and basic hands-on experience writing Ansible playbooks is valuable , and experience using Git and GitHub is necessary. This workshop is for those who wan...
August 18, 2022
Organizer:
Red Hat Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.