Virtual
-
Online
The impact of security misconfiguration hasn’t changed because of Covid-19 pandemic so much as it’s been magnified. The top three misconfigurations that cause data breaches continue to be:
Failing to remove unused access permissions
Setting up incorrect access through misconfigured zones and subnets
Creating overly permissive rules
And there’s plenty more. Be prepared!
Virtual
-
Online
Artificial intelligence, machine learning, applied at the edge are driving a new generation of intelligent applications. Data generated from billions of IoT devices and sensors must be processed very quickly at the edge to derive real-time insights, and help achieve key mission goals and objectives like saving lives, providing tactical advantage, saving costs, improving security and safety, etc. How can you operationalize these innovative technologies and optimize the capabilities? Join experts from Nvidia, HPE and Red Hat as we dive into AI/ML and data science at the edge.
Virtual
-
Online
The need for increasing levels of software security is becoming even more apparent as organizations migrate applications to the Cloud and adopt DevSecOps as part of their software development and operational processes. During this panel discussion, you will hear from todays’ top industry leaders including Dr. Ross from NIST who will highlight the latest security guidance under NIST SP 800-53, Rev. 5, and the role security plays as organizations migrate applications to the Cloud and embrace DevSecOps. Experts will explore one of the new security controls outlined in NIST SP 800-53, Rev.
Virtual
-
Online
Live Panel Discussion and Q&A | Avoid Downtime and Resolve Issues Sooner with CIS Guidance
Virtual
-
Online
Cybersecurity breaches are an unfortunate reality for all industries, with ransomware increasingly the go-to mode of attack for cybercriminals. But K-12 schools are disproportionately affected by cybercrime. More than 500 K-12 schools were victimized by ransomware in 2019 alone.
Why do cybercriminals focus on school districts? What is it about K-12 education that makes these entities such attractive targets?
Virtual
-
Online
The Foundations for Evidence-Based Policymaking Act (including the OPEN Government Data Act) created new data governance dynamics within agencies by requiring agencies to designate the Statistical Officials, the Evaluation Officers, and the Chief Data Officers. These three officials are responsible for the best practices that support the maturity of an agency's use of data. The U.S. Department of Education (ED) built a data-centric culture and is working to expand the use of data stewardship across the agency.
Virtual
-
Online
Today, agencies are striving to improve their application security programs, while at the same time, not slowing down the development, delivery, and deployment of their software applications. Can a balance be achieved between security and an organization’s (or agency’s) daily business requirements? We know it’s possible.
Virtual
-
Online
The 2016 Elections exposed glaring vulnerabilities in U.S. voting systems as hackers conducted “research and reconnaissance” against election networks in all 50 states, breached at least one state registration database, attacked local election boards, and infected the computers at a voting technology company.
Why were hackers able to expose such vulnerabilities in U.S. voting systems?
Virtual
-
Online
Learn how to visualize a path to marketing excellence during this 90-minute virtual event. Hear an executive viewpoint on why it’s never been more important to understand customer signals. Then dive right into our agenda, which we designed specifically for marketers and features our customers, as well as our effervescent host, Jay Baer.
Register Now
Virtual
-
Online
Visibility is key to preventing a breach, after all, you cannot secure devices you cannot see. This is how many threat actors breach your network!
We will be discussing: