Zero Trust Workshop: Implement and Execute
Join us for a virtual hands-on workshop to learn how to simplify and accelerate your zero-trust adoption and take your security expertise to new heights. In this workshop, you will discover how to implement zero-trust to deliver results, integrate zero-trust into your daily workflow, uncover best practices you can use right away, and network with your peers to share strategies, techniques, and outcomes. Get excited as you dive right in and: Un...
April 18, 2024
Organizer:
Cisco Location:
Webcast
FedCyber Exchange
The 2nd Annual Tanium FedCyber Exchange, is taking place on April 18, 2024, at the Convene in Arlington, VA. This event will bring together Tanium users and beyond from across the federal government to discuss how to address the modern threat landscape. What’s in Store: Morning Sessions: Hear from Dan Streetman, Tanium CEO, and other cyber leadersacross government and industry. Dive into discussions about securing critical i...
April 18, 2024
Organizer:
Tanium Location:
Arlington, VA
Zero Trust Architecture with Cloud Post...
Orca Security, in collaboration with Epoch Concepts, invites you to an exclusive cloud security workshop! This event aims to equip technology professionals like yourself with valuable insights into the intricacies of Cloud Posture Management and Cloud Workload Protection, emphasizing their crucial roles within a Zero Trust Architecture framework. During this workshop, you can expect to: Gain deep insight into Cloud Posture Management and Cloud...
Federal Executive Forum Zero Trust Stra...
Zero trust continues to be a crucial piece of cybersecurity initiatives. But how are strategies evolving to stay ahead of tomorrow’s cyber threats? During this webinar, you will gain the unique perspective of top government cybersecurity experts. Panelists also will share lessons learned, challenges and solutions, and a vision for the future.
Gov Identity Summit
It’s a pivotal year. Federal agencies face immediate deadlines for key Zero Trust goals, while transforming digital service delivery and modernizing legacy systems. State and local governments made cybersecurity and digital services their top strategies for 2024. The DoD’s identity program is accelerating cloud adoption, while government contractors are readying for new compliance rules. And across the nation, colleges and universi...
April 23, 2024
Organizer:
GovExec 360 Location:
Washington, DC
Strengthening ICAM Solutions with AAL3...
Join us as Yubico and Axiad join forces to explore a comprehensive approach encompassing user-centric authentication, secure credential issuance, and lifecycle management utilizing security keys. In this session, hear from Axiad’s Chief Innovation Officer, Bassam Al-Khalidi and Yubico’s Senior Solutions Engineer, David Papp on how to: Strengthen your Zero Trust identity posture Increase IT productivity and reduce downtime Unify and...
Lunch 'N Learn Presented by Palo Alto N...
Cortex® XSIAM™ centralizes, automates and scales security operations to protect organizations from advanced attacks. In an era where cyberthreats evolve at an unprecedented pace, the intersection of AI and cybersecurity promises to reshape the landscape of defense and protection. This is driving the SOC to undergo a transformative journey. We explore Cortex XSIAM® 2.0 — a new way to run the SOC — with an automation-fi...
Bolster Identity Security with Password Safe
Attacks on identities, especially those with elevated access and privileges, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. In this perimeter-less, remote world, organizations need a higher degree of privileged access protection that eliminates the ability for attackers to gain access and move laterally. A zero tru...
Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
Zero Trust Implementation: Update
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principles of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.