Back to Search Begin New Search Save Search Auto-Notify
Basic Cyber Hygiene and Zero Trust Principles
The federal government places a lot of emphasis on basic cyber hygiene practices that employees should use, such as using unique passwords for every application and changing them regularly, guarding against clicking on suspect links buried in emails, and backing up data frequently. The Cybersecurity and Infrastructure Security Agency (CISA) offers a wide range of cyber hygiene services to help agencies improve their cybersecurity postures thro...
June 23, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Rise of Phishing-Resistant MFA: How...
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. We’ve seen how incompatible authentication mechanisms hinder interagency communication and collaboration, as well as how weak authentication mechanisms leave the Federal Government vulnerable to exploits. Over the years, a variety of policies and memos—as well as high-profile...
June 16, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Approaching Zero Trust Holistically
The U.S. military understands the importance of strategy, and planning out the logistics of supporting that strategy. Once the big objective is determined, leaders determine the strategy that will achieve it, then work upstream, identifying the materials and manpower required, the order of events, bottlenecks to be addressed, and so on.This approach should apply to the entire federal government’s efforts to implement zero trust. The obje...
June 8, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
What Zero Trust Means for You and Your Agency
Zero trust security is coming. Not just because it plays a central role in the cyber executive order and other mandates and guidance. Zero trust is coming because it's essential to improving security. It enables agencies to ensure that the right people have the right access to applications, data and other resources needed to get their job done and further their agency's mission. Join us online Tuesday, June 7 at 2 p.m. ET/11 a.m. PT to hear fr...
June 7, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Swish - Government, Innovation, Strateg...
The past two years have brought about a decade’s worth of change to federal technology, from rapidly pivoting to and sustaining a remote, virtual-enabled workforce, to revitalizing customer experience at the heart of government’s biggest missions – all while defending against increasingly sophisticated attacks and making big bets on next generation technologies like cloud, AI and automation. And these transformations are only...
May 19, 2022
Organizer: FedScoop
Location: Washington, DC
Add Favorite
Federal Breakfast Summit: Improving the...
As we have entered a new digital age, the needs and expectations of citizens have changed. Now that we have transitioned to a virtual world, we have entered challenges that our citizens and users have yet to face. Part of the underlying challenge that the users are facing is the online experience itself. This conversation aims to discuss the new Executive Order and introduce a long-overdue and positive shift in the government-citizen dynamic....
May 11, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
FCW Workshop: Zero Trust Marching Order...
With cyberattacks on the increase at all levels of government, The White House issued a new executive order at the end of January that requires agencies to have a zero trust architecture in place by the end of FY 2024. The Office of Management and Budget followed with a memorandum (M-22-09) that laid out the requirements agencies must meet and the deadlines for completing the tasks outlined in the document. OMB identified five areas of focus--...
May 4, 2022
Organizer: GovExec
Location: Washington, DC
Add Favorite
Identity Management Lays the Foundation...
When the pandemic drove millions of government employees out of their offices and into remote work two years ago, the need to overhaul legacy identity and access management (IAM) processes became apparent. President Biden’s Executive Order and National Security Memorandum on cybersecurity pushed this further by embedding Zero Trust architecture at their core, and January’s memorandum from the Office of Management and Budget (M-22-0...
April 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
2022 ATARC Federal Security Breakfast Summit
As agencies look to replace legacy systems with the cloud, Zero Trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud. Hear from topic experts as they dive into the best practices f...
April 14, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Battle of Cyberwarfare: How Your Agency...
Hacking, ransomware, phishing and other sophisticated cyberattacks have taken center stage in the recent conflict between Russia and Ukraine. However, those attacks are not limited to the borders of those countries. Here in the U.S., many government agencies are actively working to train, prepare and respond to similar attacks. Join us online Thursday, April 14 at 2 p.m. ET/11 a.m. PT, as government and industry experts talk about the realitie...
April 14, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Back to Search Begin New Search