What Suppliers Need to be Doing Now: CMMC Roll-Out Update

Nearly half way through 2020, the roll-out of Cybersecurity Maturity Model Certification (CMMC) is progressing toward DoD’s objective of including CMMC requirements in some RFPs before the end of the year. The CMMC Accreditation Body is launching a Provisional Program that, for an initial set of contracts, will require Primes and their suppliers to complete […]

Mastering Cybersecurity Asset Management – Once and for All

Understanding your assets is the foundation of cybersecurity, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex, teams are struggling to keep up

GRC Conference Virtual Event

ISACA and The IIA are pleased to once again collaborate to bring you the 2020 Governance, Risk, and Control (GRC) Virtual Conference.

KRIS FOR IT RISK MANAGEMENT IN A POST-PANDEMIC WORLD

The COVID-19 pandemic has forced organizations to adapt to the new realities of remote work, social distancing, and alternative working arrangements. The new policies introduced to govern these situations have stretched the limits of existing technology and operating capabilities—creating increasing exposure to existing and new IT risks

[CMMC Webinar] Get a Handle on CUI Before It’s Too Late

Controlled Unclassified Information (CUI) is an integral component of any DOD contract, and protecting the security of this information is every DOD contractor’s responsibility. CUI is critical to managing and protecting our nation’s Intellectual Property (IP). The DOD estimates over $600 billion are lost every year to data exfiltration, and that’s why CMMC and the […]

Data Protection in the Cloud

Data protection is a core principle of any security strategy and requires visibility into data-at-rest and data-in-motion for effective data loss protection (DLP) policies and rules. Combine this objective with the overwhelming use of cloud apps freely adopted by business units and users, as well as the increasing number of remote workers and the end […]

Lessons From Election Security Challenges

2020 is poised to be the most critical security landscape for elections – locally, nationally, and globally – and this issue will continue to grow and become more complex. Voter data is at risk of compromise, misinformation is rampant, and security issues – real or perceived – will remain regardless of regulation. What data analytics, […]

PCI – 2020 North America Community Meeting

Don’t miss THE data security event of the year for the payment card industry. Although we will not be together face-to-face, we will still gather virtually to hear important Council updates, regional insights, startling industry reports and are creating an engaging agenda for this multiday virtual event. The North America Community Meeting continues to be […]

The Top 3 Areas Where Today’s CISO Need to Focus

The Covid-19 pandemic has had a profound effect on almost every aspect of our life: how we work, how we travel, how we shop and how we interact with our friends and families. Even more jarring is that this change happened in a matter of weeks or months, and we still face a great deal […]

Firewall Chat: Best Practices to Block Ransomware

Ransomware attacks have come back with a vengeance. More than half of organizations admitted to being hit by ransomware in the last year at an eye-watering average remediation cost of $761,106 per attack. One of the most effective methods for protecting against ransomware attacks like Ryuk, Sodinokibi, Maze, and Ragnar Locker is to fortify your […]

How to Unlock the Security Benefits of the CIS Benchmarks

Adopted globally by governments, private sector enterprises and academia, the CIS Benchmarks are critically important for establishing and maintaining a strong, effective foundation for all of your cyber efforts. By attending this webinar, you will gain insight into how the CIS Benchmarks are developed, why they matter, and effective strategies and approaches for using the […]

Would you like for your event to be displayed on the events calendar?  Submit cybersecurity related events using our event submission form.