Back to Search Begin New Search Save Search Auto-Notify
CyberArk IMPACT World Tour - DC
CyberArk is taking the Identity Security conversation to the Washington, DC area during IMPACT World Tour. Join us and your Public Sector and industry peers in Tyson's Corner on April 3rd, to discuss the ever-expanding attack surface, the latest techniques in identity-based cyberattacks, and innovations in Identity Security technology. You'll walk away informed and inspired to take your Identity Security program to the next level. Who should a...
April 3, 2024
Organizer: Merlin Cyber
Location: McLean, VA
Add Favorite
DoD Zero Trust Symposium
The second annual virtual symposium will reflect the progress with ZT implementation. Hear from more than 20 different speakers representing government, industry, and academia who will share their perspectives and experiences. Learn about ZT implementation successes and other lessons learned that can help you whether you are just beginning with ZT or you are well along the path of ZT implementation.
April 2-3, 2024
Organizer: Defense Acquisition University
Location: Virtual
Add Favorite
Unlocking Zero Trust: Maximizing and Ev...
The foundation for successful Zero Trust implementation lies in establishing a trusted data source that spans all devices and networks. Forescout, a longstanding provider of device visibility and control solutions, offers a reliable option that predates the inception of the CDM program. Its track record in serving civilian customers across government sectors underscores its expertise in this domain. Join us on March 27th for a webinar hosted b...
March 27, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
IBM Cyber Tools for a ZT SOC of the Future
Threat remediation encompasses a series of risk prevention steps to know how best to act when defending your surface systems from data breaches and financial disruption. This workshop is to help inform and advise SOC professionals on an agnostic, interoperable, risk adverse way to prioritize and measure the impact to your end-to-end incident response framework and act on ways it can be improved through trusted, targeted use of AI and Automation.
March 21, 2024
Organizer: IBM Center of Excellence
Location: Washington, DC
Add Favorite
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
ATARC Federal Zero Trust Summit 2024
In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to s...
March 13, 2024
Organizer: ATARC
Location: Washington, DC
Add Favorite
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. Join us to learn how this technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At...
March 13, 2024
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Climbing the Mountain: A New Era for Go...
In an era where cyber threats are increasingly sophisticated, the need for robust cybersecurity strategies in government IT departments is more pressing than ever. These threats are continuously evolving, leveraging new technologies and exploiting vulnerabilities in innovative ways. As a result, there is an urgent need for IT sectors to adapt and enhance their cybersecurity strategies. This adaptation isn’t just about implementing new te...
March 7, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
OpenText Government Summit
Leaders across the federal government are under pressure to deliver on an ever-expanding mission with limited resources. Doing so requires the modernization of systems and processes to connect data, content, and applications to maximize existing infrastructure investments and enhance information availability, value, and security. With countless directives and executive orders on everything from cybersecurity and data sharing to improving the c...
March 5, 2024
Organizer: GovExec 360
Location: Tysons, VA
Add Favorite
Back to Search Begin New Search