Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
Gov Identity Summit
It’s a pivotal year. Federal agencies face immediate deadlines for key Zero Trust goals, while transforming digital service delivery and modernizing legacy systems. State and local governments made cybersecurity and digital services their top strategies for 2024. The DoD’s identity program is accelerating cloud adoption, while government contractors are readying for new compliance rules. And across the nation, colleges and universi...
April 23, 2024
Organizer:
GovExec 360 Location:
Washington, DC
FedCyber Exchange
The 2nd Annual Tanium FedCyber Exchange, is taking place on April 18, 2024, at the Convene in Arlington, VA. This event will bring together Tanium users and beyond from across the federal government to discuss how to address the modern threat landscape. What’s in Store: Morning Sessions: Hear from Dan Streetman, Tanium CEO, and other cyber leadersacross government and industry. Dive into discussions about securing critical i...
April 18, 2024
Organizer:
Tanium Location:
Arlington, VA
Zscaler Public Sector Summit 2024
Experience the Future of Digital Transformation at the Zscaler Public Sector Summit on April 4, 2024! The summit is a premier event that's quickly become a landmark in the world of cybersecurity. If you haven't experienced it yet, 2024 is the perfect year to start! Here’s what makes the Zscaler Public Sector Summit an unmissable event: Inspirational Keynotes: Prepare to be inspired by a lineup of industry pioneers, including our visionar...
April 4, 2024
Organizer:
Zscaler Location:
Washington, DC
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer:
ATARC Location:
Webcast
CyberArk IMPACT World Tour - DC
CyberArk is taking the Identity Security conversation to the Washington, DC area during IMPACT World Tour. Join us and your Public Sector and industry peers in Tyson's Corner on April 3rd, to discuss the ever-expanding attack surface, the latest techniques in identity-based cyberattacks, and innovations in Identity Security technology. You'll walk away informed and inspired to take your Identity Security program to the next level. Who should a...
Mitigating Risk with an Identity-First...
The number of cyber-attacks and the sophistication with which they are being executed is on the rise. Compromise to personal credentials has nearly doubled, and also accounts for well over half of reported incidents. Today’s IT leaders must mitigate these threats and ensure that both the mindset and technology toolset they implement keep their organizations – and their most critical assets – secure. That’s why many are...
March 26, 2024
Organizer:
Entrust Location:
Webcast
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer:
FedInsider Location:
Webcast
IBM Cyber Tools for a ZT SOC of the Future
Threat remediation encompasses a series of risk prevention steps to know how best to act when defending your surface systems from data breaches and financial disruption. This workshop is to help inform and advise SOC professionals on an agnostic, interoperable, risk adverse way to prioritize and measure the impact to your end-to-end incident response framework and act on ways it can be improved through trusted, targeted use of AI and Automation.
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.