Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
F5 Ft. Meade Lab Day
F5 is releasing a new OS for the first time in over a decade! BIG-IP Next is designed to advance application security and traffic management for DoD apps spanning both on-premises and in multi-cloud architectures. The new OS allows for streamlining operations and automation, while improving performance scalability and reliability of both traditional and modern applications - all while providing deep insights into your application health, netwo...
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer:
FedInsider Location:
Webcast
SANS Pen Test Austin 2024
Keep Hacking Weird in Austin for Hands-On Cyber Security Training SANS Pen Test Austin 2024 is the premier offensive security training event of the year, featuring six days of in-depth, hands-on pen testing, red teaming, purple teaming, and exploit training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks. Come for the hack...
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer:
ATARC Location:
Webcast
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer:
FedInsider Location:
Webcast
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
Adobe ColdFusion Summit East 2024
Save the date to join Adobe and Carahsoft for our interactive Adobe ColdFusion Summit East 2024, the premier event for coders to exchange ideas, inspiration, and experiences with peers and thought leaders. It is now returning after a hiatus of three years to Washington, DC! Mark your calendars for the opportunity to engage with innovators from various government agencies and organizations working towards meeting the demands of the future. In a...
Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
Zero Trust Architecture with Cloud Post...
Orca Security, in collaboration with Epoch Concepts, invites you to an exclusive cloud security workshop! This event aims to equip technology professionals like yourself with valuable insights into the intricacies of Cloud Posture Management and Cloud Workload Protection, emphasizing their crucial roles within a Zero Trust Architecture framework. During this workshop, you can expect to: Gain deep insight into Cloud Posture Management and Cloud...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.