Lunch Bytes Webinar Series
Don't settle for a regular break. Join Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Upgrade your lunch time with Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases across the following four 30-minute sessions.
How Do You Know Where to Start Your Zer...
Do you have all the parts of zero trust in place to control risk to your crown jewels? If you don't know where to start, you probably need to assess your situation. Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust j...
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
Digital Forensics for National Security...
Defense Strategies Institute is proud to announce the 5th Annual Digital Forensics for National Security Symposium on May 15-16th, 2024. The Digital Forensics Symposium will bring together IC, DoD, federal government, industry, and academia in a town hall style forum to collaborate across the community on ways to advance digital forensics solutions to support criminal investigations, crime prevention, and threat mitigation efforts.The symposiu...
New Zero Trust Endpoint Technology for...
Join this webinar led by HP and ClearCube Technologies about Zero Trust architecture, focusing on Zero Trust functionality and compliance of end user computers (endpoints). Attendees will gain an understanding of the differences between traditional zero clients, thin clients, and the new Trusted Zero Clients and will learn about opportunities to easily begin this exciting new technology in their environments as way to begin preparing for the c...
Unknown Assets are the Achilles Heel of...
Achieving complete visibility across complex federal environments is at the crux of effective defense against today’s relentless threat landscape, as well as a core tenet of zero trust and compliance. Yet gaining an in-depth, accurate inventory of all IT, OT, IoT, mobile, and remote assets has proven elusive for many federal agencies despite deploying tools to this end. Existing solutions have consistently failed to uncover risky unknown...
Automate Your Zero Trust Workflow
During this webinar, Zack and Willie will discuss: How PC Matic's innovative technology modernizes traditional Software Bill of Materials (SBOM), Zero Trust, CDM, and Secure by Design initiatives How the solution streamlines Zero Trust policy enforcement points, simplifying governance processes while bolstering compliance efforts. How the solution integrates seamlessly into existing infrastructures, optimizing operations without solution d...
Modernizing Security: Simplifying Zero...
Government security teams today are under constant siege. Not only are they responsible for defending their organizations, but they are also tasked with complying with new and in-depth mandates that span Zero Trust, logging and most recently, artificial intelligence (AI). Leading agencies such as Oak Ridge National Laboratory are at the forefront of security innovation modernization. They achieve this by embracing next-generation solutions tha...
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer:
Qualys Location:
Washington, DC
Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration with GuidePoint Security and Technology Partners. GuidePoint Security experts have been working with industry leading partners in the federal cybersecurity space, leveraging their capabilities in our Zero Trust lab to build integrated solutions for federal use cases. Recognizing that the traditional perimeter model is failing to protect our most valued data, every one of our technology partne...
May 23, 2024
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.