On-Demand Webinars
CUI and CDI - The Federal Push to Protect Sensitive Technical Information
This webinar will examine the reasons for the federal initiative, review the methods chosen, and inform defense and civilian contractors on what they must do to protect both CUI and CDI. You will better understand what must be protected, the methods of safeguards to apply, how to assess and improve upon your existing security, and when reporting obligations arise. This webinar will help you map the new requirements and navigate to compliance.
On-Demand Webinars
Cyber Challenges and Opportunities - Changing Landscape in the Federal Marketplace
Join us for this excellent opportunity to learn about the latest and best opportunities for acquiring federal contracts in Cyber related products and services plus the regulatory challenges faced by both contractors and the government.
On-Demand Webinars
Cybersecurity - Building Critical Infrastructure Resiliency
You will be attacked, you will be breached, now what do you do? Organizations focus on securing the cyber infrastructure, monitoring the networks, and hunting for threats. At the moment of the breach how do you respond? Organizations must develop the response and recovery plans that include operational decision impacts at the business process level, continuity of business responses, public relations, as well as technology driven decisions. The leadership of the organization must practice when to escalate and ask for help from outsider providers, informing law enforcement, and engaging with critical business partners. We will discuss how the elements of the response framework and how to practice and improve your plan.
On-Demand Webinars
Cybersecurity and C-Suite Responsibility-Connecting the Server and Board Rooms to Mitigate Business Risk
Cybersecurity Starts at the Top. Long relegated to IT, cybersecurity has now emerged as a significant business challenge that demands attention from senior leadership. The complexity and importance of today's cyber security challenges require more from the C-Suite than just sponsorship and budget approval. This session focuses on the intersection of business and cybersecurity, elevating the security dialog above the technology arms race and toward informed strategic risk management. Topics include: strategies for effective governance, developing a cyber-aware organization, evaluating readiness, and crisis management.
On-Demand Webinars
Cybersecurity and Social Engineering: Understanding the Weakest Link
Industrial espionage and other criminal activity takes advantage of basic human behavior. During this webinar we will discuss and make you aware of common techniques used by aggressors, appropriate response measures, and best individual security practices. The webinar will help employees of government agencies, private industry, health care facilities, financial institutions or anywhere else that regularly stores sensitive information, be prepared for and prevent information loss.
On-Demand Webinars
Cybersecurity Challenges for Supply Chains - Practical Compliance Strategies for Contractors
With the constantly-changing cybersecurity policy and legal landscape, perhaps the only thing government contractors can be certain of is that it is impossible stay abreast of every cybersecurity development and still run a business. This program for compliance professionals, contract directors and managers, government contracts lawyers (i) organizes and distills the "need to know" rules and regulations on cybersecurity,
On-Demand Webinars
Cybersecurity in the Golden State
In this webinar, we'll explore the statutes, regulations, state policies and management directives that inform cybersecurity compliance in California, with particular focus on state agencies and the entities that contract with them. We'll also discuss steps that small businesses can take to limit their exposure to cybersecurity threats, and the reporting requirements if such a breach occurs.
On-Demand Webinars
Cybersecurity Information Sharing After CISA: What You Need to Know
With attackers seeking to use their tools over and over, cybersecurity information sharing can help make the difference in whether they succeed when they come after you. Recognizing this, in December the President and Congress collaborated to enact the Cybersecurity and Information Sharing Act of 2015. This program illuminates the information sharing landscape, looks at lessons learned to date, some key questions and implementation issues companies exploring or engaged in sharing should consider, and explores the implications of various choices companies can make.
On-Demand Webinars
General Data Protection Regulation (GDPR)
Presented to you by a host of subject matter experts, this webinar will focus on the new General Data Protection Regulation (GDPR) law and how it will impact business worldwide. Presenters will define and explain the law, give insight into what it means, and discuss best practices in protecting data.