Back to Search Begin New Search Save Search Auto-Notify
Unlocking Zero Trust: Strategic Approac...
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy? Join moderator Jason Miller, and agency and industry leaders on Feb. 7 at 2 p.m. to gain insights into the critical aspects of Zero Trust Architecture and how it can help reshape and innovate your cybersecurity approach. Learning objectives: Modernizing security through zero trust Navigating the zero trust culture shift Applying automation in security
February 7, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Identity Based Access for Warfighter Cy...
Zero Trust is a cutting-edge cybersecurity method gaining ground, especially in defense and government agencies like the Defense Information Systems Agency (DISA). Adopting a Zero Trust model revolves around the continuous verification and monitoring of all devices and users trying to access any network, ensuring cyber resiliency and robust security measures for secrets management, encryption, access control and auditing in warfighter operatio...
February 6, 2024
Organizer: HashiCorp Government Team at Carahsoft
Location: Webcast
Add Favorite
Navigating the Complex Landscape of Mod...
The cat-and-mouse game between threat actors and cybersecurity professionals continued unabated in 2023, with new threats designed to avoid detection. Many of these threats are new takes on old ones, such as “leveling up” invoice fraud. And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment by threatening to post the info online or t...
January 31, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Overcoming Stolen Identities: Enabling...
Adversaries increasingly leverage stolen identities to escalate privileges and steal data in the cloud. Over 80% of hacking breaches involved credentials, whether lost or stolen, to impersonate users for further compromise. Join us as we delve into implementing the DoD’s groundbreaking Zero Trust Strategy. This session will explore how the DoD's Zero Trust Strategy strategically integrates identity protection and endpoint detection withi...
January 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Washington DC SASE Summit
Networking, Security, and Zero Trust: A Federal & Enterprise Evolution The modern IT landscape is complex, characterized by the intricate interplay of Federal and commercial sectors, each with unique challenges and requirements. Join us to discuss how Netskope SASE framework provides an environment of enhanced security, efficiency, and innovation, by offering tailored solutions adept at meeting the nuanced demands of both sectors. We will...
January 24, 2024
Organizer: Netskope
Location: Washington, DC
Add Favorite
Accelerating Zero Trust Through Decepti...
Acalvio and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Join us for an insightful discussion to learn about our Active Defense proactive approach to cybersecurity, empowering organizations to predict attackers' actions, strategically set traps, and closely monitor attacker interaction...
January 24, 2024
Organizer: Acalvio Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust is Needed to Win the Cyber War
Zero trust revolutionizes network security architecture because it is data-centric and designed to stop data breaches. While that is its primary purpose for government, it also increases agility for modern networks that traditional network designs can’t emulate. It has been almost two years since the Office of Management and Budget issued its federal zero trust architecture strategy, which set out specific goals for agencies to achieve b...
January 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Budgeting Ideas to Reach a Zero Trust Future
Ransomware, malware, phishing, DDoS, social engineering, zero-day exploit, botnets – the list of types of attacks out there is long enough to keep even the most seasoned cybersecurity expert awake at night. And with the increased use of remote computing, the cyber attack surface grows as more edge devices are added to networks. Creating a zero trust environment holds a lot of promise to provide significantly improved cybersecurity. In th...
January 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. This slogan fits into the Department of Defense mindset, which is always focused on how to reduce risk, but it’s a challenge to apply it to the federal government’s largest agency. An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in e...
November 28, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Welcome to the CSA Zero Trust Summit
The Zero Trust model, which operates on the principle of ‘never trust, always verify,’ is quickly rising as the favored strategy to protect important assets. CSA’s Virtual Zero Trust Summit, taking place November 15-16, 2023, will deliver the knowledge needed to understand the core concepts of Zero Trust. Featuring prominent industry leaders such as John Kindervag, the founder of Zero Trust philosophy, the Summit will provide...
November 15-16, 2023
Organizer: Cloud Security Alliance
Location: Virtual
Add Favorite
Back to Search Begin New Search