Mission: Possible - More Compliant with Identity-Centric PAM



Government agencies hold a vast amount of sensitive information, ranging from personnel records, budgetary data, inter-community communications to intelligence findings related to terrorists and hostile nations. In turn, governments all over the world are continually under threat of cyber-attacks launched by rival nation-states, terrorist groups, hacktivists, and cyber criminals. In addition, they are facing insider threats as showcased by Edward Snowden.

 

A compromise of government data could jeopardize the national security and undermine public safety. In turn, government agencies, be it on the Federal, State, or Local level, are mandated to comply with a variety of industry standards (e.g., NIST SP 800 Series) and government regulations (e.g., CIS, CJIS, DHS CDM, FERPA, FICAM, FISMA, HIPAA, HITECH, HSPD-12, MARS-E, OMB, PCI-DSS, Publication 1075).

 

Unfortunately, the onslaught of compliance mandates seems to overwhelm many government agencies rather than improving their state of cyber security. According to the 2019 Verizon Data Breach Investigations Report, the government sector has experienced more data breaches than all other industries. Considering the sensitivity of data that is being exfiltrated via cyber-espionage or by state-affiliated actors, these breaches pose a serious threat to economic and national security.

 

Join to hear our speakers as they:

  • Assess perceptions versus reality in government security practices;
  • Provide an overview of the main industry standards and government regulations that drive compliance efforts in federal, state, and local agencies;
  • Outline the benefits of applying an Identity-Centric PAM approach based on Zero Trust principles to ensure that access to their compute (on-premises or in the cloud), network, DevOps, and data resources is appropriate, sanctioned, compliant, as well as secure; and
  • Discuss the future of compliance requirements for the government sector, drawing upon Mr. Eftekhari engagement in a variety of legislative measures.

 

Register for the live session or watch on-demand after the live event.

Speaker and Presenter Information

Torsten George
CyberSecurity Evangelist, Centrify

 

Parham Eftekhari
Board Chair, Institute for Critical Infrastructure Technology
SVP & Executive Director, The Cybersecurity Collaborative

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Census Bureau, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, USAID, State & Local Government, National Guard Association, EEOC, Federal Government, FDA, Foreign Governments/Agencies, NSA, FCC


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, May 28, 2020, 2:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Centrify


Contact Event Organizer


Join the event conversation:
@Centrify


Return to search results