CTA Webinar – CISA 2015 Reauthorization: What’s all the fuss about?

The Cybersecurity Information Sharing Act of 2015 was the culmination of more than five years of work. Someone reading the statute now might think the activities it authorizes are rather pedestrian. Yet, concerns at the time were significant enough that the statute included a sunset clause for September 30, 2025. Read More

Post Type
event

CTA Webinar – Cyber Surprises and Continuity: Predictions for 2025

The more things change, the more things stay the same.  That statement certainly seems to apply to cybersecurity: while threats continually evolve, many of the underlying problems remain unchanged for years.  This webinar will explore how cyber threats could manifest in 2025 and what issues will continue to drive the… Read More

Post Type
Blog
Category
Webinar

CTA Webinar – Cyber Surprises and Continuity: Predictions for 2025

The more things change, the more things stay the same.  That statement certainly seems to apply to cybersecurity: while threats continually evolve, many of the underlying problems remain unchanged for years.  This webinar will explore how cyber threats could manifest in 2025 and what issues will continue to drive the… Read More

Post Type
event

CTA Webinar: The Cybersecurity Divide — Addressing the Cyber Poverty Line

When Wendy Nather coined the term “cybersecurity poverty line,” the cybersecurity industry was not paying attention to how unevenly cybersecurity capabilities were distributed. This term provided a way to conceptualize the stark divide between the companies who could afford to invest in good cybersecurity and those who could not, and… Read More

Post Type
Blog
Category
Webinar

CTA Webinar – The Cybersecurity Divide: Addressing the Cyber Poverty Line

When Wendy Nather coined the term “cybersecurity poverty line,” the cybersecurity industry was not paying attention to how unevenly cybersecurity capabilities were distributed. This term provided a way to conceptualize the stark divide between the companies who could afford to invest in good cybersecurity and those who could not, and… Read More

Post Type
event

CTA Webinar: A Tangled Web — The Hard Problem of Complexity

Complexity is the enemy of security, whether physical or virtual.  Improving security usually requires reducing complexity, but in cyberspace, the opposite trend holds true – complexity is growing at an amazing rate.  Not surprisingly, we struggle with deploying effective cybersecurity in this type of environment.  Yet, there are reasons for… Read More

Post Type
Blog
Category
Webinar

CTA Webinar: A Tangled Web — The Hard Problem of Complexity

Complexity is the enemy of security, whether physical or virtual.  Improving security usually requires reducing complexity, but in cyberspace, the opposite trend holds true – complexity is growing at an amazing rate.  Not surprisingly, we struggle with deploying effective cybersecurity in this type of environment.  Yet, there are reasons for… Read More

Post Type
event

CTA Webinar – Guardians of Good, Fortifying NGO Cyber Defenses 

In today’s digital age, NGOs face a unique and evolving set of cyber security threats that can jeopardize their missions and operations. Join Chelsea Conard, Dianna Langley, Ian Gottesman, and Alexandru Lazar for this webinar, “Guardians of Good: Fortifying NGO Cyber Defenses,” as they discuss a comprehensive overview of the… Read More

Post Type
Blog
Category
Webinar