Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.
Event Date |
Thu Jul 20 UTC (over 1 year ago)
In your timezone (EST): Wed Jul 19 8:00pm - Wed Jul 19 8:00pm |
Location | Webinar |
Region | All |
Cyber vulnerabilities have dramatically increased across all industries, but the weakest links in security architecture your endpoints and users – remain the same regardless of industry. Without a security strategy that forms a fortress of protection around endpoints and users, governments are leaving huge gaps in their cybersecurity defense.
One approach organizations can leverage to prevent this is embedding security features into CPU motherboard hardware – not only can built-in security help detect spear-phishing and other behavior-based attacks, but it can also mitigate risk from lost or stolen PCs.
Learn more about the strategies and tools governments can use to keep their people, endpoints and devices secure during a live webinar.
A panel of cybersecurity experts will offer insights on how governments can help defend against and recover from cyberattacks and provide practical advice and actionable next steps for agencies looking to cut down on cyber vulnerabilities.
Key takeaways include:
· The key components of threat containment technology
· Four critical threat vectors and how to avoid them
· Threat and vulnerability management capabilities to look for in cybersecurity solutions
2023 Speakers
Dr. Kimberlee Brannock
Senior Security Advisor, HP Worldwide Security and Analytics Practice
MODERATOR:
Deb Snyder
Senior Fellow, Center for Digital Government
2023 Sponsor
• HP