IBM TechU talks: Fully Homomorphic Encr...
Unlock the value of data on less trusted domains without needing to decrypt it. Use Fully Homomorphic Encryption (FHE) to securely collaborate with other institutions across borders and product lines to fight financial crime, determine disease prognosis, or secure supply chains - all while preserving privacy.
September 28, 2021
Organizer:
IBM Location:
Webcast
Introduction to Governance and Complian...
Course Details Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources. To sign up for this training, first register for the AWS Summit Washington, DC. Breakfast...
Introduction to Governance and Complian...
Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources.
Using a Smartphone? Important CJIS Cons...
Smartphones provide operational benefits that can be significantly expanded if officers can access criminal justice databases. This requires compliance with Criminal Justice Information Services (CJIS) policy and can be somewhat challenging. This webinar will provide clear guidance on key areas including multi-factor authentication, mobile device management, encryption requirements, and compensating control options. Presenters include a vetera...
Prepare for Transformational Changes to...
With the recent cybersecurity threats and attacks, including breached content, the shutdown and lock outs of systems and the recurrence of ransomware, the reality of the need for zero-trust and cybersecure systems is evident. The White House responded with a new Cybersecurity Executive Order that lays out and defines stringent mandates to update policies and procedures across government entities for adopting cybersecurity best practices. These...
Authentication and the White House Cybe...
In May, the White House issued its Executive Order on Improving the Nation's Cybersecurity. The EO states as policy, “Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments in order to defend the vital institutions that underpin the American way of life. The Federal Government must bring to bear the full scope of its authorities and resources...
July 15, 2021
Organizer:
FEDINSIDER Location:
Webcast
Introduction to Governance and Complian...
Course Details Join this training to get an overview of the services that you can use to help meet compliance and governance controls in the Amazon Web Services (AWS) Cloud. You’ll discover the fundamental cloud security concepts, including access control, data encryption methods, incident response, and security for network access to AWS resources. Topics Covered: Identify and describe the security benefits and responsibilities of using...
CyberRx: Securing Healthcare Data
The core goal of any public sector healthcare facility is to provide the best possible care for their patients. But those facilities are also charged with the safekeeping of their patient’s medical data and personal information. Exactly how that data should be protected is tightly defined through regulations like the electronic protected health information rules as well as laws like the Health Insurance Portability and Accountability Act...
June 24, 2021
Organizer:
FEDINSIDER Location:
Webcast
WhatWorks in Deploying Effective and Ef...
Business damages from ransomware and phishing attacks have made it clear that sensitive business information and application must be better protected. Increased enforcement of national- and state-level privacy laws, as well as the need to secure data across multiple cloud environments, has highlighted the need for reliable and transparent data encryption services to protect information while enabling business access. During this SANS WhatWorks...
Ransomware Resilience in a Multicloud Era
Ransomware is rapidly emerging as the most visible cybersecurity risk playing out across our nation’s networks. Criminals are establishing increasingly sophisticated operations by pivoting their attacks from data encryption to exfiltration, complicating the security challenges already created by remote working. The organizations unable to implement detection and response solutions leave themselves open to many types of data integrity att...
June 15, 2021
Organizer:
GovExec Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.