Back to Search Begin New Search Save Search Auto-Notify
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
ServiceNow Federal Forum Intelligent Tr...
How can the government deliver services better? Delivering intelligently. It’s transforming with simplicity, resilience, security, speed, and execution. It’s powering our country’s digital footprint with intelligent platforms. At the ServiceNow Federal Forum, explore how Federal innovators are creating unified experiences across the enterprise. We’re using intelligent platforms for end-to-end digital transformation. Thi...
March 21-22, 2024
Organizer: ServiceNow | MeriTalk
Location: National Harbor, MD
Add Favorite
IBM Cyber Tools for a ZT SOC of the Future
Threat remediation encompasses a series of risk prevention steps to know how best to act when defending your surface systems from data breaches and financial disruption. This workshop is to help inform and advise SOC professionals on an agnostic, interoperable, risk adverse way to prioritize and measure the impact to your end-to-end incident response framework and act on ways it can be improved through trusted, targeted use of AI and Automation.
March 21, 2024
Organizer: IBM Center of Excellence
Location: Washington, DC
Add Favorite
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Analytics From The Frontlines
Join Kodak and Carahsoft for this webinar to learn: Best practices for data curation and model training to optimize AI outputs. How to leverage accelerated data access solutions to establish a continuous data pipeline across global and hybrid data sources to feed your AI models and analytics platforms. Considerations for deploying a future-ready AI program so AI workloads anywhere can tap into data everywhere. Upgrade promo opportunity for cus...
March 20, 2024
Organizer: Vcinity Government Team at Carahsoft
Location: Webcast
Add Favorite
One True Zero Live Boston
In a world where cyber attackers and complexity are our adversaries, zero trust architecture is a proven solution. Join us as we deep dive on technology innovations and real customer implementations to help you take advantage of solutions for cyber threat protection, data protection, zero trust connectivity and business analytics that will help you reduce risk, optimize productivity and gain agility.
March 19, 2024
Organizer: Zscaler
Location: Boston, MA
Add Favorite
Zero Trust Workshop: Implement and Execute
Join us for a virtual hands-on workshop to learn how to simplify and accelerate your zero-trust adoption and take your security expertise to new heights. In this workshop, you will discover how to implement zero-trust to deliver results, integrate zero-trust into your daily workflow, uncover best practices you can use right away, and network with your peers to share strategies, techniques, and outcomes. Get excited as you dive right in and: Un...
March 13, 2024
Organizer: Cisco
Location: Webcast
Add Favorite
ATARC Federal Zero Trust Summit 2024
In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to s...
March 13, 2024
Organizer: ATARC
Location: Washington, DC
Add Favorite
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. Join us to learn how this technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At...
March 13, 2024
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Enhancing the Resiliency and Security o...
Join Salesforce and Own Company as we discuss what the year ahead looks like for the U.S. Federal Government. In 2024, current Federal agencies using Salesforce Government Cloud will be making the move to Hyperforce. This migration will help agencies incur compliance, meet local regulations for data storage, and increase security. Ahead of this migration, there are many recommended best practices your org can enact and have in place to ensure...
March 13, 2024
Organizer: Own Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search