Back to Search Begin New Search Save Search Auto-Notify
The Rise of Phishing-Resistant MFA: How...
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. We’ve seen how incompatible authentication mechanisms hinder interagency communication and collaboration, as well as how weak authentication mechanisms leave the Federal Government vulnerable to exploits. Over the years, a variety of policies and memos—as well as high-profile...
June 16, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Approaching Zero Trust Holistically
The U.S. military understands the importance of strategy, and planning out the logistics of supporting that strategy. Once the big objective is determined, leaders determine the strategy that will achieve it, then work upstream, identifying the materials and manpower required, the order of events, bottlenecks to be addressed, and so on.This approach should apply to the entire federal government’s efforts to implement zero trust. The obje...
June 8, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
What Zero Trust Means for You and Your Agency
Zero trust security is coming. Not just because it plays a central role in the cyber executive order and other mandates and guidance. Zero trust is coming because it's essential to improving security. It enables agencies to ensure that the right people have the right access to applications, data and other resources needed to get their job done and further their agency's mission. Join us online Tuesday, June 7 at 2 p.m. ET/11 a.m. PT to hear fr...
June 7, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Swish - Government, Innovation, Strateg...
The past two years have brought about a decade’s worth of change to federal technology, from rapidly pivoting to and sustaining a remote, virtual-enabled workforce, to revitalizing customer experience at the heart of government’s biggest missions – all while defending against increasingly sophisticated attacks and making big bets on next generation technologies like cloud, AI and automation. And these transformations are only...
May 19, 2022
Organizer: FedScoop
Location: Washington, DC
Add Favorite
Federal Breakfast Summit: Improving the...
As we have entered a new digital age, the needs and expectations of citizens have changed. Now that we have transitioned to a virtual world, we have entered challenges that our citizens and users have yet to face. Part of the underlying challenge that the users are facing is the online experience itself. This conversation aims to discuss the new Executive Order and introduce a long-overdue and positive shift in the government-citizen dynamic....
May 11, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Balancing Global Collaboration with Inf...
archTIS is pleased to invite you to attend our live event on “Balancing Global Collaboration with Information Security: Best Practices for Tackling Defense and Supply Challenges” on Thursday, May 5, 2022. Close collaboration with allies and partners, supply chain and seamless communication, war gaming (i.e. Project Convergence, Overmatch, etc.) and research all require secure information access and sharing to be successful. Program...
May 5, 2022
Organizer: archTIS
Location: Arlington, VA
Add Favorite
Identity Management Lays the Foundation...
When the pandemic drove millions of government employees out of their offices and into remote work two years ago, the need to overhaul legacy identity and access management (IAM) processes became apparent. President Biden’s Executive Order and National Security Memorandum on cybersecurity pushed this further by embedding Zero Trust architecture at their core, and January’s memorandum from the Office of Management and Budget (M-22-0...
April 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
2022 ATARC Federal Security Breakfast Summit
As agencies look to replace legacy systems with the cloud, Zero Trust has risen as a best cybersecurity practice. Listen in as topic experts discuss the shift to a teleworking workforce and the importance behind Zero Trust security. This shift has triggered new cybersecurity strategies within the Federal Government, especially as Government agencies make the migration to the cloud. Hear from topic experts as they dive into the best practices f...
April 14, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Battle of Cyberwarfare: How Your Agency...
Hacking, ransomware, phishing and other sophisticated cyberattacks have taken center stage in the recent conflict between Russia and Ukraine. However, those attacks are not limited to the borders of those countries. Here in the U.S., many government agencies are actively working to train, prepare and respond to similar attacks. Join us online Thursday, April 14 at 2 p.m. ET/11 a.m. PT, as government and industry experts talk about the realitie...
April 14, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Action Steps to Zero Trust in Government
Ever since the White House issued its Cybersecurity Executive Order in May 2021, a lot of attention has been paid to the concept of zero trust embedded as its core objective. But the reason to get to zero trust is to protect the data – after all, what do system intruders want? To read, or alter, or copy the data, which they can then use for their own purposes, from monetizing intellectual property to stealing someone’s identity to...
April 14, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search