Back to Search Begin New Search Save Search Auto-Notify
Stay One Step Ahead: Enhancing Your Ide...
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Research conducted by the Identity Defined Security Alliance (IDSA) states that 79% of organizations have had an identity-related breach in the last two years. To combat these threats, it is crucial to adopt a Privileged Access Management strategy. This strategy encompasses a combination of tools, processes, and policies that ensure the right indivi...
January 30, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Innovative Utilization of Privileged Ac...
As technology rapidly advances, the challenges faced by the US military in securing sensitive information in Dynamic, Distributed, and Interconnected Landscapes (DDIL) have grown exponentially. Protecting critical assets against ever-evolving cyber threats necessitates adopting cutting-edge solutions that enhance security without compromising operational efficiency. In this speaking session, we will delve into the unique and effective applicat...
September 12, 2023
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Tech Talk Tuesday: Protect & Control Ac...
Join this technical product clinic to understand how to better monitor and control access for privileged users, outside vendors, and contractors accessing your OT environments. Leveraging the BeyondTrust Privileged Remote Access (PRA) solution, you can transform your OT security roadmap while seamlessly continuing operations, maintaining agency agility and user accessibility/productivity. We’ll show you a live demo of how PRA can: Elimin...
March 14, 2023
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
BeyondTrust Tech Talk Tuesday: How to P...
100% of world's super computers & more than 90% of all servers in the cloud run on Linux. Without Linux, trains would stop running and planes would stop flying. Google and Amazon run on Linux. These are all considered high value targets to hackers.Join BeyondTrust's technical product clinic to learn about the Linux landscape and how to protect your Linux environment from external attacks and malicious insiders.During the session, Steve Sch...
November 15, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Meeting Mandates with Identity-Driven Z...
Zero Trust is about knowing who is doing what within your network and ensuring that in the event of anomalous activity, you can control and limit threats to the network. Applying the granularity of Privileged Access Management (PAM) to achieve Zero Trust objectives ensures all access is appropriate, managed, and documented, regardless of how the perimeter has been redefined. To stay agile, agencies must leverage Zero Trust principals to never...
September 15, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Fireside Chat: Aligning ICAM, the Execu...
In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term "Zero Trust" from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify,...
May 4, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
March 15, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing the Future: Zero Trust, Identi...
With users and devices now accessing critical information, systems, and applications from anywhere in our distributed digital world, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met. Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. Hear from a distinguished panel of federal cybe...
October 21, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing DoD Enterprise Innovation with ICAM
Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department's complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to...
September 8, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Improving National Cybersecurity: Gover...
President Biden’s Executive Order (EO) has accelerated the crucial need to improve U.S. cybersecurity and move towards Zero Trust. When building a true Zero Trust Architecture (ZTA), it’s critical for agencies to understand that security solutions need to work together to provide the best line of defense. Almost every attack today requires a stolen identity or privilege to execute and initially compromise an environment or to move...
July 28, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search