AWS re:Invent
We invite you to join us for keynotes, launches, sessions, and more—presented across 3 weeks from Nov. 30 – Dec. 18.
We invite you to join us for keynotes, launches, sessions, and more—presented across 3 weeks from Nov. 30 – Dec. 18.
Register now to explore best practices in privacy solutions, expand your global network and earn up to 9 CPE credit hours all in one day from the comfort of your home. Learn how to assess, build, and implement privacy solutions for your organization; stay up to date on evolving privacy laws and regulations; and ensure […]
On behalf of CMMC Accreditation Body Board and all of our partners both within the government and industry, we invite you to participate in the January 2021 CMMC AB Town Hall on the 26th from 6:00-7:30PM ET. The event registration will be on a first come, first served basis and will have a capacity of 3000 […]
As a small business owner, it's your job to protect not only your business' data, but also your customers' data from breaches and theft. In this webinar, Malcolm Web, Team Lead for Identity and Cyber Protection Services at Generali Global Assistance, will discuss the business need of protecting customer data, the tools you can use to […]
No doubt about it: this year was wildly unpredictable. Every month – heck, every week seemed to be weirder than the next (murder hornets, anyone?). We may not know what 2021 has in store for us, but we do know there are some things security and IT teams can do right now to make the […]
New DFARS Interim Rules went into effect in December 2020, forcing defense contractors to adhere to new processes and requirements, and placing greater emphasis on compliance with cybersecurity regulations. Contractors who handle Controlled Unclassified Information (CUI) must now conduct self-assessments of NIST 800-171 compliance status in accordance with NIST 800-171A assessment guidance; score themselves on […]
Resilience demands that we make a conscious commitment to anticipate, prevent, respond, and adapt to adverse events. Join us for an extended play demonstration that walks you through operational processes and innovations to build technology, supplier, workforce, supplier, and process resilience. In this session we will cover the operational resilience lifecycle to help you define […]
Consumers expect organizations to respect their privacy, and organizations that do not may face severe fines and reputational damage. The ISACA 2020 State of Privacy survey revealed that privacy is not going anywhere, as boards of directors prioritize privacy, and many survey respondents anticipate privacy budgets to increase or stay the same, despite the financial […]
Summary The recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. Agenda The recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. Responding effectively to breaches and hacks requires a cross-section of technical skills and process insights. […]
As of November 30th, all members of the DIB subject to implementation of the NIST SP 800-171 standard must have a current (completed within the past 3 years) DoD Assessment on record in the DoD’s Supplier Performance Risk System (SPRS) to be eligible for an award, subcontract, or contract extension or modification. What does that mean for your […]
Watch this free webinar to learn about built-in security capabilities of Windows Virtual Desktop. You’ll also find out how to improve your security posture by integrating your desktop environment with other Azure and Microsoft offerings. Get technical guidance to help you: Understand the security controls available in Windows Virtual Desktop. Use multifactor authentication and conditional […]
Discover how you can utilize Digital Internal Audit across your organization to improve audit quality and manage risk more effectively. In this course, you will gain a deeper understanding of how digital continues to evolve in the marketplace, the technologies supporting digital, and how organizations can effectively begin the journey to implementing a digital capability. […]
Would you like for your event to be displayed on the events calendar? Submit cybersecurity related events using our event submission form.