CTO Sessions: Thales TCT + Imperva: Tru...
Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protect valuable data. Enter data-centric security, which offers CISOs transformative opportunities to fortify data protection, compliance adherence and operational efficiency. Yet, ensuring robust defense mechanisms remains imperative, given the diverse pathways to data each with its own unique securi...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
To Succeed with Zero Trust & AI, Look t...
Ever since the issuance of Executive Order 14028, issued in May 2021 to improve cybersecurity across the entire government by implementing a zero trust architecture, federal agencies have been hard at work to meet the requirement. Then, in October 2023 – less than 18 months later – a new executive order, 14110, was released on the “Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.” These are...
May 31, 2024
Organizer:
FedInsider Location:
Webcast
On Cloud 9: The Public Sector's Path to...
In today's dynamic landscape, government and education professionals face mounting challenges securing cloud environments. As agencies transition to multicloud infrastructures, gaining visibility and prioritizing risk becomes imperative for implementing an effective Zero Trust strategy. Join Government Technology and cloud security experts from Wiz for an insightful webinar where we'll delve into the critical aspects of and top strategies for...
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer:
FedInsider Location:
Webcast
How to Prioritize Mission Delivery and...
Join us as thought leaders from government and industry discuss the evolution of Salesforce security threats, operational continuity requirements, Zero Trust security principles, and practical strategies for protecting data against targeted attacks and insider incidents. Learning Objectives Review the kinds of cyber threats facing Salesforce, such as expanding an agency’s external attack surface and unclear responsibilities in the event...
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
Adapting to Change: Zero Trust Integrat...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer:
ATARC Location:
Webcast
Lunch Bytes Webinar Series
Don't settle for a regular break. Join Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Upgrade your lunch time with Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases across the following four 30-minute sessions.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.