Archived Events
K-12 and Higher Education organizations are being targeted by threat actors more than ever. In this presentation we discussed the threat landscape and how to leverage threat intelligence, EDR, MDR, and Identity Protection to keep you protected.
Attendees joined KCAV, CrowdStrike, and former CISO of the State of ...
Government organizations face threats, like none other. Ensuring that a robust security posture fits inside the regulatory and budget requirements of any agency is a huge feat onto itself. Add on ...
Adversaries are relentless and continue to go after critical government infrastructure, communities, and schools. In today’s threat landscape, it takes a team and tools to prevent these ...
AWS subject matter experts discussed AWS solutions and how they can help you achieve digital transformation without disruption by enabling a digital foundation that delivers any app on any cloud to any device.
Topics explored include:
Artificial intelligence and machine learning
Amazon ...
In 2021 there was an 82% increase in ransomware-related data leaks and over 170 adversary groups being tracked for their cyber activity. Every organization is at risk, and due to the data-rich environment, K-12 school districts are considered high-value mines for ransomware groups.
Our K-12 meeting featured ...
The demands on the public sector are greater than ever and to meet these demands, agencies are transforming how they collect and use data. These advancements are leading to new ways of service in a modernized workforce – and paired with an increased digital presence – means increased risk and more destructive ...
Sensitive healthcare data attracts sophisticated cyber attacks. And in today’s work-from-anywhere, on any device environment, a scalable zero trust security posture with endpoint protection is required to better arm security teams. We must protect users, applications, and sensitive protected health information (PHI) ...
Managing and delivering data-driven services while meeting public demands is a clear challenge for governments – whether it’s self-service access to data, government transparency, or timely responses to services. But how can you manage and deliver data securely while meeting public ...
Zero Trust Network Access (ZTNA) initiatives stress the importance of constant assessment of access across the architectural pillars. In practice, this requires an integrated approach to exchanging telemetry between various policy decisions and policy enforcement points to facilitate ...
In 2021 there was an 82% increase in ransomware-related data leaks and over 170 adversary groups being tracked for their cyber activity. Every organization is at risk, and due to the data-rich environment, K-12 school districts are considered high-value mines for ransomware ...