Back to Search Begin New Search Save Search Auto-Notify
Manageable Zero Trust for OT Networks
Check out our on-demand recording of Waterfall Security Solutions and Carahsoft as we discussed how the modern approach to OT cybersecurity initiatives employs both zero-trust architectures and micro-segmentation and how applying these modern concepts to OT networks can be challenging. Attendees of this webinar also learned that OT security programs focus on: Protecting the safety of personnel Reliability of industrial production Physical pre...
Add Favorite
Protect Your Agency's Data with Rubrik...
View this on-demand webinar discover how Rubrik and Clearshark can defend your agency's data against cyber attacks. Experts from Rubrik and Clearshark discuss how Rubrik's unique immutability and zero trust architecture, integrated with Clearshark's innovative solutions, instills confidence that your organization's data can be quickly and accurately recovered. Our featured speakers dive into the industry- changing Rubrik and Clearshark integr...
Add Favorite
State & Local Security Thought Leadership
The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data.Join VMware, WWT, and Carahsoft for an informative talk with Eric O'Neill, VMware's National Security Strategist. Hear him discuss real-life spy stories and a review of recent massive cyber-attacks to show ho...
Add Favorite
Google Cloud Security Command Center Webinar
View this on-demand webinar to learn how to secure your Google Cloud environment with Security Command Center, Assured Workloads, Beyond Corp and Cloud IAP. Securing and maintaining compliance for your cloud environment is a continuous process and with the tools provided with Google Cloud you can protect your environment from intruders, vulnerabilities, and remain compliant. During this on-demand webinar, you will learn how we can: Manage risk...
Add Favorite
Zero Trust and Your Agency: What It Wil...
Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024. While...
Add Favorite
Accelerating Government Digitization: S...
Although IT leaders understand the benefits of cloud computing, there is still apprehension in the transition process due to new, persistent, and evolving thread models and compliance requirements. As such, the Biden administration issued an executive order to help federal agencies establish a zero-trust framework and effectively secure their enterprise. What impact have these measures had on public sector cybersecurity strategies? During this...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
Enabling the Anywhere Workspace with VMware
The pandemic provided a wakeup call on how quickly and profoundly the employee experience can change. Overnight SSA had to adapt to a more distributed workforce, with the security perimeter reaching far beyond the premises of the office building. View this on-demand webcast to learn how VMware helped design and implement these solutions around the Federal Healthcare community over the past few years. During this on-demand webcast, our engineer...
Add Favorite
VMware Anywhere Workspace
As work moves to a hybrid model, each remote employee becomes a possible target and threat to your network and data. Providing remote access through VPN's is rapidly becoming obsolete as companies look for more robust alternatives like Zero Trust Network Access (ZTNA). Attendees joined VMware and Carahsoft for a webinar to gain insight on how VMware SASE combines the cloud VMware SD-WAN (Software-Defined Wide Area Network), Gateway, VMware Sec...
Add Favorite
Back to Search Begin New Search