Back to Search Begin New Search Save Search Auto-Notify
Risky Business: Understanding Enterpris...
Discovering, prioritizing, and monitoring cybersecurity risks across an ecosystem of third-party products is a complex undertaking for any business, let alone a large enterprise. Join us for an in-depth discussion exploring best practices, lessons learned, and the regulatory environment associated with third-party risk management. Speakers will provide insight and tips into overcoming the challenges of defining and implementing a holistic risk...
March 28, 2023
Organizer: Fortress
Location: Webcast
Add Favorite
Implementing the New NIST Guidelines fo...
As supply chain complexity continues to grow, so does the need for illumination and regulatory standards. Federal contractors need to be aware of the updated NIST guideline requirements and best practices for implementation.
April 6, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
America Under Cyber Attack: Operating i...
How to Prevent & Manage Supply Chain Risks Last year foreign hackers secretly broke into a US-based IT security solution provider and added infected code into their software. As part of the company’s regular software update process, the company unknowingly forwarded malicious code, creating a backdoor to their clients' IT systems. Multiple government agencies and private organizations were impacted. The breach caught many of the Fede...
February 23, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search