Back to Search Begin New Search Save Search Auto-Notify
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
April 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Federal Executive Forum Zero Trust Stra...
Zero trust continues to be a crucial piece of cybersecurity initiatives. But how are strategies evolving to stay ahead of tomorrow’s cyber threats? During this webinar, you will gain the unique perspective of top government cybersecurity experts. Panelists also will share lessons learned, challenges and solutions, and a vision for the future.
April 22, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Zero Trust Workshop: Implement and Execute
Join us for a virtual hands-on workshop to learn how to simplify and accelerate your zero-trust adoption and take your security expertise to new heights. In this workshop, you will discover how to implement zero-trust to deliver results, integrate zero-trust into your daily workflow, uncover best practices you can use right away, and network with your peers to share strategies, techniques, and outcomes. Get excited as you dive right in and: Un...
April 18, 2024
Organizer: Cisco
Location: Webcast
Add Favorite
Cisco Zero Trust Workshop: Strategy and...
Registration is Closed 70%. That’s the number of organizations that are considering a zero-trust framework following the massive shift to remote working and the new level of advanced threats to the business. We understand the importance of having a plan and a practice around zero-trust now more than ever before. Join us for a virtual hands-on workshop to assess your zero-trust readiness and take your security expertise to new heights. In...
April 9, 2024
Organizer: Cisco
Location: Webcast
Add Favorite
Lunch Bytes Webinar Series
Don't settle for a regular break. Join Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Upgrade your lunch time with Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases across the following four 30-minute sessions.
April 9, 2024
Organizer: Dynatrace Government Team at Carahsoft
Location: Webcast
Add Favorite
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Start Here: An Introduction to Zero Trust
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
April 4, 2024
Organizer: Zscaler
Location: Webcast
Add Favorite
Back to Search Begin New Search