89 webcasts found
+ 3 past events found
Back to Search Begin New Search Save Search Auto-Notify
Manageable Zero Trust for OT Networks
Check out our on-demand recording of Waterfall Security Solutions and Carahsoft as we discussed how the modern approach to OT cybersecurity initiatives employs both zero-trust architectures and micro-segmentation and how applying these modern concepts to OT networks can be challenging. Attendees of this webinar also learned that OT security programs focus on: Protecting the safety of personnel Reliability of industrial production Physical pre...
Add Favorite
Protect Your Agency's Data with Rubrik...
View this on-demand webinar discover how Rubrik and Clearshark can defend your agency's data against cyber attacks. Experts from Rubrik and Clearshark discuss how Rubrik's unique immutability and zero trust architecture, integrated with Clearshark's innovative solutions, instills confidence that your organization's data can be quickly and accurately recovered. Our featured speakers dive into the industry- changing Rubrik and Clearshark integr...
Add Favorite
State & Local Security Thought Leadership
The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data.Join VMware, WWT, and Carahsoft for an informative talk with Eric O'Neill, VMware's National Security Strategist. Hear him discuss real-life spy stories and a review of recent massive cyber-attacks to show ho...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
Cybersmart TV: Zero Trust as a Federal...
Adopting a zero trust architecture is certainly not a new concept but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyber threats, a permanently expanded perimeter defining the next normal, and increased support from the current administration to prioritize its advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s att...
Add Favorite
Google Cloud Security Command Center Webinar
View this on-demand webinar to learn how to secure your Google Cloud environment with Security Command Center, Assured Workloads, Beyond Corp and Cloud IAP. Securing and maintaining compliance for your cloud environment is a continuous process and with the tools provided with Google Cloud you can protect your environment from intruders, vulnerabilities, and remain compliant. During this on-demand webinar, you will learn how we can: Manage risk...
Add Favorite
Zero Trust and Your Agency: What It Wil...
Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024. While...
Add Favorite
Accelerating Government Digitization: S...
Although IT leaders understand the benefits of cloud computing, there is still apprehension in the transition process due to new, persistent, and evolving thread models and compliance requirements. As such, the Biden administration issued an executive order to help federal agencies establish a zero-trust framework and effectively secure their enterprise. What impact have these measures had on public sector cybersecurity strategies? During this...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
Back to Search Begin New Search