Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer:
Qualys Location:
Washington, DC
Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration with GuidePoint Security and Technology Partners. GuidePoint Security experts have been working with industry leading partners in the federal cybersecurity space, leveraging their capabilities in our Zero Trust lab to build integrated solutions for federal use cases. Recognizing that the traditional perimeter model is failing to protect our most valued data, every one of our technology partne...
May 23, 2024
Organizer:
ATARC Location:
Webcast
CTO Sessions: Thales TCT + Imperva: Tru...
Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protect valuable data. Enter data-centric security, which offers CISOs transformative opportunities to fortify data protection, compliance adherence and operational efficiency. Yet, ensuring robust defense mechanisms remains imperative, given the diverse pathways to data each with its own unique securi...
Modern Identity in State Government wit...
Identity is the first pillar in the CISA Zero Trust Framework and governs who has access to the right resources at the right time. However, many organizations still struggle to implement a cohesive strategy that effectively incorporates the three core elements of identity - IAM, IGA, and PAM in today’s landscape. Join us on May 30th for a discussion surrounding Modern Identity in State Government. Okta & Active Cyber will cover the i...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
To Succeed with Zero Trust & AI, Look t...
Ever since the issuance of Executive Order 14028, issued in May 2021 to improve cybersecurity across the entire government by implementing a zero trust architecture, federal agencies have been hard at work to meet the requirement. Then, in October 2023 – less than 18 months later – a new executive order, 14110, was released on the “Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.” These are...
May 31, 2024
Organizer:
FedInsider Location:
Webcast
On Cloud 9: The Public Sector's Path to...
In today's dynamic landscape, government and education professionals face mounting challenges securing cloud environments. As agencies transition to multicloud infrastructures, gaining visibility and prioritizing risk becomes imperative for implementing an effective Zero Trust strategy. Join Government Technology and cloud security experts from Wiz for an insightful webinar where we'll delve into the critical aspects of and top strategies for...
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer:
FedInsider Location:
Webcast
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.