Invalid post type: event_post_type
CrowdStrike

As applications, data, and everything IT shifts to the cloud, so too does cybersecurity. It’s more than just securing the cloud — it’s about actually using the cloud, and the advanced analytics it enables, to protect organizations. Security models are changing, and the cloud is a pivotal enabler of that change. […]

Invalid post type: event_post_type
Cybersecurity

Managing cyber risks means fighting a moving target, and bad actors are too often one step ahead. Even as cyber professionals protect systems from malware, phishing, and DoS attacks, new attack vectors including the IoT and AI are emerging. Federal agencies needs a continuous discussion on the evolving defense practices needed to identify vulnerabilities, prepare for changes in cyber attack strategy, and identify fundamental flaws in defense plans.






[…]

Invalid post type: event_post_type
Mingle and Jingle

Join us for a merry evening as we discuss the IT transformation initiatives and efforts that will be at the forefront of the new year’s IT agenda with a happy hour featuring beverages, heavy hors d-oeuvres, and plenty of holiday cheer.






[…]

Invalid post type: event_post_type
CDM & Eggs

With a continued focus on IT reform, the latest White House modernization report calls for increased priority around the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) program and other cyber initiatives.  Now in its fourth year, the CDM program offers real-time visibility into network vulnerabilities – and continues to evolve as agencies transform their aging systems. 






[…]

Invalid post type: event_post_type
CSX QM

Government’s interest in cloud-based, SaaS security solutions is growing as IT modernization priorities expand. More automated security monitoring and real-time analytics are critical to improving agencies cyber security posture – but concern over security applications living in the cloud and uncertainties over ownership have deterred greater adoption across the government.






[…]

Invalid post type: event_post_type
CDM & Eggs

CDM and Eggs Breakfast – Next Phase: May 18, 2017 DHS’ continuous diagnostics and mitigation (CDM) program, now in its fourth year, continues to be at the top of the government cyber security agenda. Phase I is being implemented, Phase II is in process, and Phase III is about to be underway. As we look […] […]

Invalid post type: event_post_type
CSX QM New Cyber Era
Invalid post type: event_post_type
Mingle and Jingle
Invalid post type: event_post_type

The drive for enhanced identity security across government has steered agencies towards two-factor authentication. Still, a myriad of vulnerabilities exist and adversaries only need one attack vector to unleash serious damage.






[…]

Invalid post type: event_post_type

Insider attacks pose a constant threat to the critical data entrusted to our government – nearly half of federal agencies have been targeted. The need to prepare for attacks from authorized insiders has added complexity to cybersecurity strategies. NIST’s Cybersecurity Framework has provided agencies with a set of industry standards and best practices to help […] […]

1 2 3