Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date From Mandate to Execution: Building a Modern Cybersecurity Strategy Sponsored by Cribl Cyber-attacks are becoming more and more uninhibited and boundless, which means cybersecurity efforts must evolve their complexities to be able to kee... 9 hours ago | 42 mins Windows 10 & Active Directory Security Best Practices for Preventing Ransomware Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) According to the Department of Homeland Security, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Moreover, the Departme... 4 months ago | 68 mins From Mandate to Execution: Building a Modern Cybersecurity Strategy Sponsored by Cribl Cyber-attacks are becoming more and more uninhibited and boundless, which means cybersecurity efforts must evolve their complexities to be able to kee... 4 months ago | 42 mins TSA Pipeline Security Directive: What’s New and Recommendations Roman Arutyunov, Amit Pawar, and Neelakarun Asari To combat the increasing number of cyber attacks targeted at critical infrastructure, the Department of Homeland Security's Transportation Security Ad... 9 months ago | 59 mins Flash: Deleted Text Messages from Secret Service, DOD & DHS & Other Scandals James Dever & Jack Dever, Lockhaven Solutions, Jason R. Baron, Former NARA Dir. of Litigation & Mary Mack, EDRM EDRM Ripped From the Headlines Flash Webinar Series: In this fireside roundtable, guests, Jason R. Baron, former NARA and current Professor of the P... 10 months ago | 59 mins Russia-Ukraine Conflict: Impact on Cyber Threats to US Healthcare John Riggi, Sr. Advisor for Cybersecurity & Risk AHA. Carolyn Crandall, Chief Security Advocate, Attivo Networks. The outbreak of European conflict over the past week brings with it an unprecedented level of concern for pending cyber-attacks. In light of previous... 1 year ago | 30 mins ATARC Law Enforcement Summit: Securing Your Environment With Automation Eric Sanders and Michel Epley Automation is a key element of FedRAMP operations in general and cyber security efforts. Automating cyber security functions “has become imperative, a... 1 year ago | 110 mins Federal I&O Guide on Delivering Availability, Compliance & Cyber Resilience Lon Gowen from USAID; Norman Speicher from U.S. Department of Homeland Security (DHS); Kevin Coyne from DOC Panel of industry experts discuss the increased need for availability, disaster recovery, and data protection solutions in a time of uncertainty. Now... 3 years ago | 66 mins From The Source: CISA Ransomware Campaign and Zero Trust Directives Amy Nicewick, Chief of Comunications Management, Cybersecurity and Infrastructure Security Agency, DHS The CISA Ransomware Campaign and Zero Trust Directives Zero trust, supply chain security, and DevSecOps. These are the three 2021 priorities for CISA ... 2 years ago | 79 mins CMMC 2.0 AMA with Matt Travis CEO of CMMC-AB Matthew Travis, CEO of CMMC-AB | Adam Mansour, CSO of ActZero.ai (an RPO) Join our special guests, Matthew Travis, CEO of the Cybersecurity Maturity Model Certification Accreditation Body (CMMC-AB), and Adam Mansour, CSO of ... 1 year ago | 57 mins Load more