14 webcasts found
+ 31 past events found
Back to Search Begin New Search Save Search Auto-Notify
Zero Trust and Your Agency: What It Wil...
Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024. While...
Add Favorite
Govern Your MFDs with the Only COTS Sol...
How can mixed hardware, multi-functional device (MFD) enterprises extend the O365 services (including Scan-to-OneDrive for Business) to their employees and devices while meeting the US Government's zero-trust CAC/PIV security protocols? Let Kofax be your solution. Join the on-demand webinar from Kofax and Microsoft to: Discover Kofax ControlSuite's purpose-built integration with Microsoft O365 to maximize O365 services/offerings and multi-func...
Add Favorite
The Role of APIs in Mission Transformation
Attendees joined Google Public Sector & Carahsoft and learned more about how the Apigee API Management Platform helps agencies accelerate and amplify mission outcomes. During this on-demand webinar, attendees learned the benefits of an API-First approach: Represent government services as APIs Accelerate Modernization: Move from many to the right systems Accelerate and de-risk cloud migration Run your workload where it has merit Unlock silo...
Add Favorite
Kickstart to Compliance Series: Fast Tr...
To meet the federal mandate's requirements of a Zero-Trust architecture and enable to appropriate use of sensitive data, agencies need a consistent, reliable approach that reduces risk and protects data at scale. Join us for the first session of our Kickstart to Compliance webinar series discussing the steps you can take to incorporate modern digital solutions that enable zero trust strategies in your agency. During this kickoff session, a...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Power Zero Trust Outcomes with Trellix
With the Zero Trust Maturity Model as our guide, Trellix invites Federal Agencies to learn about what strategic investments can be made today to help reach long term Zero Trust goals. During this on-demand session attendees learned about: How XDR can help with the maturity progress across multiple pillars. How to leverage existing investments to achieve Zero Trust outcomes The importance of contextualizing data from multiple sources to surface...
Add Favorite
Zero Trust and the Future of Compliance...
Participants joined us and our panelists from Qmulos, Deloitte, and Cisco in a thought-provoking webinar that delves into the heart of Zero Trust and its transformative impact on security and compliance. We will chart the path to compliance modernization, demonstrating how Zero Trust forms the bedrock of an advanced, data-driven security architecture. This session empowered IT professionals, compliance officers, and corporate leaders to align...
Add Favorite
Wiz: Advancing Cloud Security with Zero Trust
In today's ever-changing threat landscape, government agencies need a cloud security platform that can keep up. Wiz is a CNAPP platform that provides visibility and context into your cloud environment, helping you to implement Zero Trust security. As DoD spokesperson John Kirby said recently about the recent infiltration, "Cybersecurity is something you don't fix and walk away from. Cybersecurity is something you need to stay on top of every s...
Add Favorite
Embracing Zero Trust: Strengthening Sec...
Attendees of this on-demand webinar experienced a comprehensive panel discussion on Zero Trust architecture, where we will delve into the key principles, components, and implementation strategies of this security model.
Add Favorite
(IAM) Advantage: Best in Class Solution...
Attendees of this on-demand webinar learned how combining these trusted tools makes it easy to: Deliver the promised benefits of the last decade and enable the Zero Trust pillars Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives Reduce the risk of data breaches and unauthorized access to sensitive information Streamline access granting and revocation to save time and resources while reducing risk
Add Favorite
Back to Search Begin New Search