KRIS FOR IT RISK MANAGEMENT IN A POST-PANDEMIC WORLD

The COVID-19 pandemic has forced organizations to adapt to the new realities of remote work, social distancing, and alternative working arrangements. The new policies introduced to govern these situations have stretched the limits of existing technology and operating capabilities—creating increasing exposure to existing and new IT risks

[CMMC Webinar] Get a Handle on CUI Before It’s Too Late

Controlled Unclassified Information (CUI) is an integral component of any DOD contract, and protecting the security of this information is every DOD contractor’s responsibility. CUI is critical to managing and protecting our nation’s Intellectual Property (IP). The DOD estimates over $600 billion are lost every year to data exfiltration, and that’s why CMMC and the […]

Data Protection in the Cloud

Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with the overwhelming use of cloud apps freely adopted by business units and users, as well as the increasing number of remote workers and the end […]

Lessons From Election Security Challenges

2020 is poised to be the most critical security landscape for elections – locally, nationally, and globally – and this issue will continue to grow and become more complex. Voter data is at risk of compromise, misinformation is rampant, and security issues – real or perceived – will remain regardless of regulation. What data analytics, […]

PCI – 2020 North America Community Meeting

Don’t miss THE data security event of the year for the payment card industry. Although we will not be together face-to-face, we will still gather virtually to hear important Council updates, regional insights, startling industry reports and are creating an engaging agenda for this multiday virtual event. The North America Community Meeting continues to be […]

The Top 3 Areas Where Today’s CISO Need to Focus

The Covid-19 pandemic has had a profound effect on almost every aspect of our life: how we work, how we travel, how we shop and how we interact with our friends and families. Even more jarring is that this change happened in a matter of weeks or months, and we still face a great deal […]

Firewall Chat: Best Practices to Block Ransomware

Ransomware attacks have come back with a vengeance. More than half of organizations admitted to being hit by ransomware in the last year at an eye-watering average remediation cost of $761,106 per attack. One of the most effective methods for protecting against ransomware attacks like Ryuk, Sodinokibi, Maze, and Ragnar Locker is to fortify your […]

How to Unlock the Security Benefits of the CIS Benchmarks

Adopted globally by governments, private sector enterprises and academia, the CIS Benchmarks are critically important for establishing and maintaining a strong, effective foundation for all of your cyber efforts. By attending this webinar, you will gain insight into how the CIS Benchmarks are developed, why they matter, and effective strategies and approaches for using the […]

DFARS 7012 Cybersecurity Webinar Series #14: Pacific CMMC Conference Online

URGENT UPDATE: THE NEW DFARS INTERIM RULE HAS BEEN RELEASED AND GOES INTO EFFECT NOVEMBER 30, 2020! Don't miss this opportunity to get the latest information on the DoD's new DFARS rules and the rollout of the Cybersecurity Maturity Model Certification (CMMC) program, directly from CMMC program director Katie Arrington. The Cyber Collaboration Center is […]

10th Annual Cyber Security Summit

Minneapolis MN, United States

At the Cyber Security Summit, our mission is to produce a multi-stakeholder consortium that brings together industry, government and academic interests in an effort to improve the state of cyber security on both a domestic and international level.

How to Bridge the NetOps/SecOps Divide

In this webinar, we’ll talk about and illustrate how a common set of data can help both teams work and address cybersecurity requirements together. Join us to learn: • Why packet capture and flow analysis are important to cybersecurity response and remediation • How to complement existing protection, detection, and response tools using packet capture […]

[Webinar] DFARS Interim Rule: What, When, and How

According to the recently released DFARS Interim Rule, as of November 30th, all members of the DIB subject to implementation of the NIST SP 800-171 standard must have a current (completed within the past 3 years) DoD Assessment on record in the DoD’s Supplier Performance Risk System (SPRS) to be eligible for an award, subcontract, or […]

Would you like for your event to be displayed on the events calendar?  Submit cybersecurity related events using our event submission form.