Back to Search Begin New Search Save Search Auto-Notify
Basic Cyber Hygiene and Zero Trust Principles
The federal government places a lot of emphasis on basic cyber hygiene practices that employees should use, such as using unique passwords for every application and changing them regularly, guarding against clicking on suspect links buried in emails, and backing up data frequently. The Cybersecurity and Infrastructure Security Agency (CISA) offers a wide range of cyber hygiene services to help agencies improve their cybersecurity postures thro...
June 23, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Rise of Phishing-Resistant MFA: How...
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. We’ve seen how incompatible authentication mechanisms hinder interagency communication and collaboration, as well as how weak authentication mechanisms leave the Federal Government vulnerable to exploits. Over the years, a variety of policies and memos—as well as high-profile...
June 16, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Approaching Zero Trust Holistically
The U.S. military understands the importance of strategy, and planning out the logistics of supporting that strategy. Once the big objective is determined, leaders determine the strategy that will achieve it, then work upstream, identifying the materials and manpower required, the order of events, bottlenecks to be addressed, and so on.This approach should apply to the entire federal government’s efforts to implement zero trust. The obje...
June 8, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Swish - Government, Innovation, Strateg...
The past two years have brought about a decade’s worth of change to federal technology, from rapidly pivoting to and sustaining a remote, virtual-enabled workforce, to revitalizing customer experience at the heart of government’s biggest missions – all while defending against increasingly sophisticated attacks and making big bets on next generation technologies like cloud, AI and automation. And these transformations are only...
May 19, 2022
Organizer: FedScoop
Location: Washington, DC
Add Favorite
FCW Workshop: Zero Trust Marching Order...
With cyberattacks on the increase at all levels of government, The White House issued a new executive order at the end of January that requires agencies to have a zero trust architecture in place by the end of FY 2024. The Office of Management and Budget followed with a memorandum (M-22-09) that laid out the requirements agencies must meet and the deadlines for completing the tasks outlined in the document. OMB identified five areas of focus--...
May 4, 2022
Organizer: GovExec
Location: Washington, DC
Add Favorite
Identity Management Lays the Foundation...
When the pandemic drove millions of government employees out of their offices and into remote work two years ago, the need to overhaul legacy identity and access management (IAM) processes became apparent. President Biden’s Executive Order and National Security Memorandum on cybersecurity pushed this further by embedding Zero Trust architecture at their core, and January’s memorandum from the Office of Management and Budget (M-22-0...
April 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
2022 ATARC Federal Security Breakfast Summit
As agencies look to replace legacy systems with the cloud, Zero Trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud. Hear from topic experts as they dive into the best practices f...
April 14, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Battle of Cyberwarfare: How Your Agency...
Hacking, ransomware, phishing and other sophisticated cyberattacks have taken center stage in the recent conflict between Russia and Ukraine. However, those attacks are not limited to the borders of those countries. Here in the U.S., many government agencies are actively working to train, prepare and respond to similar attacks. Join us online Thursday, April 14 at 2 p.m. ET/11 a.m. PT, as government and industry experts talk about the realitie...
April 14, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Action Steps to Zero Trust in Government
Ever since the White House issued its Cybersecurity Executive Order in May 2021, a lot of attention has been paid to the concept of zero trust embedded as its core objective. But the reason to get to zero trust is to protect the data – after all, what do system intruders want? To read, or alter, or copy the data, which they can then use for their own purposes, from monetizing intellectual property to stealing someone’s identity to...
April 14, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Summit 2022
As the nation faces more persistent and sophisticated cyber threats than ever before, federal agencies can no longer take for granted that their systems and applications are secure. With that in mind, the federal government is taking unprecedented measures to protect the highly sensitive information of Americans. Central to the government’s efforts to deter, protect against, detect, and respond to a constant barrage of attacks, the Biden...
April 6, 2022
Organizer: CyberScoop
Location: Washington, DC
Add Favorite
Back to Search Begin New Search