Back to Search Begin New Search Save Search Auto-Notify
Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration, co-hosted by IBM and Palo Alto Networks. Meeting NIST 800-207 Guidelines – a demonstration of cutting edge zero trust-oriented software tools that enable and empower US Federal SOC operations to gain new efficiencies. Please note this is a hybrid demonstration. Government attendees may join virtually or in-person at the IBM Innovation Studio located at 600 14th St NW, Suite 200, Washin...
April 26, 2024
Organizer: ATARC
Location: Washington, DC
Add Favorite
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
April 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Bedrock Defenses: A Foundational Approa...
The digital landscape is a battleground where cyber threats morph with alarming agility, pushing federal agencies to seek not just any solution, but one that anticipates, adapts, and acts with precision. Enter: Artificial intelligence, a game-changer in cybersecurity offering a strategic advantage against evolving threats. Join GovExec TV to delve into this shift, bringing together government and industry leaders to explore AI’s pivotal...
May 2, 2024
Organizer: GDIT
Location: Webcast
Add Favorite
Start Here: An Introduction to Zero Trust
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
May 8, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
Enterprise Education Series: Pillars of...
Mark your calendar and join us for the next installment of our Enterprise Education Series! The topic will be the Pillars of Zero Trust, and attendees will receive 1 CLP for attending. The Enterprise Education Series is designed to: Expand your awareness of innovative contract solutions Help you drive transformative outcomes Provide you with direct points of contact for support and additional education Our upcoming event is a solutions-focused...
May 8, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Lunch Bytes Webinar Series
Don't settle for a regular break. Join Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Upgrade your lunch time with Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases across the following four 30-minute sessions.
May 14, 2024
Organizer: Dynatrace Government Team at Carahsoft
Location: Webcast
Add Favorite
How Do You Know Where to Start Your Zer...
Do you have all the parts of zero trust in place to control risk to your crown jewels? If you don't know where to start, you probably need to assess your situation. Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust j...
May 15, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
May 15, 2024
Organizer: BrightTalk Information Technology
Location: Webcast
Add Favorite
Back to Search Begin New Search