KeyCaliber is among 16 startup companies to participate in CivStart’s sixth annual Govtech Accelerator Program.
KeyCaliber's CEO discusses cybersecurity and election interference on News Nation Live with anchor Marni Hughes.
The Ultimate Guide to NIST CSF: Protect is the second of 5 live webinars on the Ultimate Guide to Implementing NIST CSF.
The Ultimate Guide to NIST CSF: Identify is the first of 5 live webinars on the Ultimate Guide to Implementing NIST CSF.
Today’s security operations centers (SOCs) are inundated with an endless stream of alerts, vulnerabilities, and threat intelligence. But the reality is that no matter how large or well-resourced a security operations team, there will always be more work to do. So the next-gen SOC must be calibrated to work smarter, not harder.
The migration to the cloud comes with risks and rewards. Understanding the risks early on and addressing them proactively can allow an organization to reap the benefits of the rewards without facing unreasonable risk. To assess risk effectively, organizations should take a top-down approach where they focus on the high value cloud assets first.
In this webinar, top researchers and experts discuss some of the most dangerous emerging vulnerabilities, and what you can do to prevent them from being exploited in your organization.
What does a security operations center (SOCs) require in 2022? The practice of monitoring and responding to threats looks very different today than it did just a few years ago. Which tools and skills do you need know to outfit a SOC to respond to today’s most current threats and online exploits? In this webinar, experts offer insight and recommendations on how to build a next-generation SOC.
The OODA (Observe, Orient, Decide, Act) loop is often applied to tactical security operations where the security analysts are in a constant state of evaluating and responding to alerts. But the same OODA loop can also be applied to the strategic decision-making and action-taking processes of cybersecurity executives.
Traditional risk models focus on calculating loss frequency and magnitude, but don’t go far enough in terms of modeling the most important assets in our organization, known as “Crown Jewels”.
Security expert, Roselle Safran, joins hosts Jerich Beason & Whitney McCollum have come together after realizing more people know more about “The Queen’s Crown Jewels” than those that are vital to their company.
Silicon Luxembourg talks with the finalists of the PWC Cybersecurity & Privacy Day pitch competition.