Back to Search Begin New Search Save Search Auto-Notify
Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
April 23-24, 2024
Organizer: Venafi Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Zero Trust Implementation: Update
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principles of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
April 25, 2024
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Unlock the True Power of Zero Trust thr...
In today’s digital landscape, corrupt content poses unprecedented challenges to cybersecurity. The mass proliferation and fragmentation of content communication systems (file-sharing services) has created threat opportunities that must be addressed urgently. Register now to learn how Kiteworks-enabled Private Content Network (PCN) and Forcepoint’s Zero Trust Content Disarm and Reconstruction (CDR) has combined to create a groundbre...
April 25, 2024
Organizer: Everfox Government Team at Carahsoft
Location: Webcast
Add Favorite
Evolving from Disjointed Views to Cohes...
Join Riverbed and Carahsoft for a live webinar exploring the need for comprehensive visibility across modern federal networks. Federal networks are complex and continually expanding, encompassing not only infrastructure layers but also end users, devices and applications. With the addition of emerging challenges such as compliance with zero-trust and end-user experience initiatives, many federal agencies find themselves relying on solutions t...
April 25, 2024
Organizer: Riverbed Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration, co-hosted by IBM and Palo Alto Networks. Meeting NIST 800-207 Guidelines – a demonstration of cutting edge zero trust-oriented software tools that enable and empower US Federal SOC operations to gain new efficiencies. Please note this is a hybrid demonstration. Government attendees may join virtually or in-person at the IBM Innovation Studio located at 600 14th St NW, Suite 200, Washin...
April 26, 2024
Organizer: ATARC
Location: Washington, DC
Add Favorite
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
April 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Bedrock Defenses: A Foundational Approa...
The digital landscape is a battleground where cyber threats morph with alarming agility, pushing federal agencies to seek not just any solution, but one that anticipates, adapts, and acts with precision. Enter: Artificial intelligence, a game-changer in cybersecurity offering a strategic advantage against evolving threats. Join GovExec TV to delve into this shift, bringing together government and industry leaders to explore AI’s pivotal...
May 2, 2024
Organizer: GDIT
Location: Webcast
Add Favorite
Back to Search Begin New Search