Back to Search Begin New Search Save Search Auto-Notify
Who Are You - and Can You Prove It? Ide...
One of the foundational tenets of zero trust architecture is Identity – providing credentials for every person and device – in order to manage access to government systems, whether entering from the outside or moving laterally from within. In other words, identity, credential and access management (ICAM) should be addressed as a whole, not as separate point solutions. This applies across all systems, all platforms, and all environm...
September 20, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Trusting Leaders in a Zero Trust Environment
As State and Local agencies pursue their zero trust goals taking into consideration the Executive Order 14028, “Improving the Nation’s Cybersecurity,” it is easy to focus on technology solutions. But that overlooks something fundamental about both the challenge and the purpose of moving to zero trust – the human beings that will use the redesigned systems to better meet their agency’s mission. If a zero-trust impl...
September 19, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
14th Annual Billington CyberSecurity Summit
Join Top Leaders from the Public and Private Sectors in Cybersecurity The 14th Annual Billington Cybersecurity Summit will take place September 5–8, 2023, at the Ronald Reagan Building and International Trade Center in Washington, DC. With the unique educational mission of convening the who's who in cybersecurity, this annual event brings together senior leadership from the U.S. government and our allied partners along with their industr...
September 5-8, 2023
Organizer: Billington CyberSecurity
Location: Washington, DC
Add Favorite
Cybersecurity Workshop: Navigating the...
This workshop will cover advanced cyber defense techniques and tools, emerging technologies in identifying zero-day vulnerabilities, mission and system resilience and survivability, and much more. Please join fellow Cyber Test & Evaluation (T&E), Acquisition, and Operation professionals from the government, industry, and academia to share information, lessons learned and knowledge. Join us at the opening Session on Wen. August 30th for...
August 29-31, 2023
Organizer: International Test & Evaluation Association
Location: Virginia Beach, VA
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
ATARC Zero Trust Lab Phase 2 Demonstrat...
ATARC’s Zero Trust Integration Lab (ZTIL) aims to showcase technical architectures and Original Equipment Manufacturer (OEM) hardware and software solutions, support proofs of concept for integrated solution sets by incorporating multiple vendors’ products, and implement Zero Trust solutions in a simulated production environment. Each demonstration team will address all aspects of Zero Trust in a provided scenario set crossing all...
August 11, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Attacks are Just as Damaging as N...
It has been almost seven years since the White House issued Presidential Policy Directive 40, setting out the federal continuity policy “to maintain a comprehensive and effective continuity capability through Continuity of Operations (COOP), Continuity of Government (COG), and Enduring Constitutional Government (ECG) programs, ensuring the resilience and preservation of government structure under the United States Constitution and the co...
July 20, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How Zero Trust Is Transforming the Way...
The Cybersecurity and Infrastructure Security Agency (CISA) found that every 14 seconds, a government agency is hit with a ransomware attack. The question then becomes, how do you make sure you aren’t the one that is going to be the weak cyber link for your organization? Zero trust is the key. Join us online Thursday, July 20 from 2-2:45 p.m. ET/11-11:45 a.m. PT to hear from government and industry leaders about zero-trust best practices.
July 20, 2023
Organizer: GovLoop
Location: Webcast
Add Favorite
Identity-Driven Zero Trust Enhancing Cy...
After decades of delay, cybersecurity has become a defining issue for the United States. In response, when the White House laid out its zero trust requirements in January 2022, it set an ambitious goal – that all agencies have their zero trust infrastructure in place before October 1, 2024. This is because of the reality of the digital age: a persistent threat environment is the norm in the IT world, and agencies have to assume they...
June 28, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
CyberSmart 2023: Combating Cyber Crime...
Cyber attacks are on the increase across all levels of government – and state and local governments are often targeted because they have fewer resources for security. For instance, an October 2022 survey found that more than half of state and local governments faced ransomware attacks in 2021, and just one in five organizations successfully stopped the attack. Strengthening the security and resilience of these agencies’ systems req...
June 8, 2023
Organizer: FEDINSIDER
Location: Austin, TX
Add Favorite
Back to Search Begin New Search