Threat Intelligence: The Role of CDM in...
The Department of Homeland Security plays a leading role in mandating the Federal Continuous Diagnostics and Mitigation (CDM) program to provide agencies visibility into their networks and identify cyber threats. Many agencies have implemented a number of security tools, and they are moving toward new methods to aggregate and analyze the collected data for a holistic picture of their security posture. Join us for a discussion between public an...
June 24, 2014
Organizer:
FEDINSIDER Location:
Webcast
GTRA Technology Council Meeting - Gover...
GTRA Technology Council Meeting - Government IT Security CollaborationJune 22 - 24, 2014The Lansdowne, Leesburg, VA The GTRA Technology Council Meeting brings together an elite group of federal IT leaders who believe in the importance of executive-level collaboration and information exchange to support the transformation of the federal government through IT. Collaborative discussions will focus on the critical issues currently facing the commu...
Reduce Risk & the Administrative Nightm...
Reduce Risk & the Administrative Nightmare: Key Management for Storage Encryption Explosive data growth, sophisticated data breaches, government regulations, and data storage requirements have caused agencies to deploy a combination of storage security solutions. Often, agencies rely on vendor-specific key management, which leads to fragmented, unsecure key stores and policies that need to be managed and maintained individually. Disparate...
The Next Chapter in Federal Cybersecurity
Continuous Monitoring & Identity Access for Secure Networks Two of the most critical initiatives under way to protect sensitive federal and military networks from outside and inside threats are continuous diagnostics and mitigation (CDM) and identity/credential/access management (ICAM). Federal information security professionals are increasingly adopting CDM and ICAM approaches to protect their critical networks as cyberthreats continue to...
The 2014 Akamai Government Forum
The 2014 Akamai Government Forum – June 5th in Washington D.C. at the Renaissance Hotel Secure computing is the IT architect of the future. The use of cloud technology is helping to streamline the way agencies operate and reshape the security landscape. Cloud security is accelerating the transformation of agency systems from something to be passively guarded into a suite of capabilities that offer government leaders opportunities to adju...
Cybersecurity: Getting to Business
For many Americans, anxiety about the hacker threat has grown in the wake of the high profile breaches at some of the nation's top retailers. For businesses, this means that the line between responsible and regulated may be shifting. The Obama Administration's cybersecurity framework is voluntary, but some say it lays the groundwork for new regulations in the future. You'll want to hear directly from the senior government officials and busines...
Availability & Security Risks in Micros...
Infoblox Tackles Availability and Security Risks in Microsoft DNS/DHCP Environments Your current Microsoft DNS and DHCP deployment is not sufficiently secure and available for modern network demands. If you think you’ve outgrown your Microsoft DNS and DHCP, join us to hear how Infoblox DDI delivers the security, availability, and overall operational efficiencies you don’t currently get from using Microsoft DNS and DHCP. The Infoblo...
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.