Back to Search Begin New Search Save Search Auto-Notify
Design & Implementation of Zero Trust A...
The Castle and Moat doctrine for IT information security is officially dead, and Zero Trust Architecture (ZTA) is the new method for securing information resources. Zero trust provides an approach to identity and access management that assumes no user or software is trusted by default. All users, devices, and applications must prove their identity and level of authentication before accessing resources. Key thoughts on this approach are never t...
Add Favorite
Tackling the Zero Trust Challenge with...
View this on-demand recording to discover what attendees learned during our Zero Trust webinar, topics including: Why Zero Trust security is important for Critical Infrastructure How to communicate the value of Zero Trust in OT to key business decision makers A simple and scalable methodology for analyzing and planning Zero Trust protection Tools to implement Zero Trust controls in OT brownfields and converged IT/OT environments How Zero Trust...
Add Favorite
Fireside Chat: Federal Cybersecurity Di...
Orca Security and Carahsoft invited individuals and their teams to join them for a virtual, interactive fireside chat with Coalfire to discuss alignment to Federal cybersecurity directives which impact every public sector organization. This webinar was joined by Doug Hudson, VP of Public Sector at Orca Security, and Nate Demuth, VP of Cloud Services at Coalfire, during a moderated session with Neil Carpenter, Principal Technical Evangelist at...
Add Favorite
Increase Operational Efficiency with Fo...
Attendees learned more about the partnership between Forescout & Splunk at our webinar. This was a live session with two of our in-house demo specialists for an informative and interactive discussion that helped attendees better understand how the use cases and capabilities of Forescout and Splunk can help organizations maximize SOC efficiency and enterprise visibility.
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Power Zero Trust Outcomes with Trellix
With the Zero Trust Maturity Model as our guide, Trellix invites Federal Agencies to learn about what strategic investments can be made today to help reach long term Zero Trust goals. During this on-demand session attendees learned about: How XDR can help with the maturity progress across multiple pillars. How to leverage existing investments to achieve Zero Trust outcomes The importance of contextualizing data from multiple sources to surface...
Add Favorite
Operationalizing Zero Trust with Deep O...
Network blind spots prevent Zero Trust deployment from being successful due to the lack of visibility into network telemetry. As the network grows and evolves, this pain will worsen if not addressed at the foundational level. Gigamon Deep Observability ensures your tools and Zero Trust policy engine have access to all network-based communications in your organization. For any effective Zero Trust implementation, full network visibility and eli...
Add Favorite
TechNet Cyber Webinar Series: Demystify...
In this on-demand webinar, attendees learned: How to avoid pitfalls in your ZTA implementation Technical and non-technical ZTA aspects Key aspects of the ZTA data pillar
Add Favorite
Zero Trust and the Future of Compliance...
Participants joined us and our panelists from Qmulos, Deloitte, and Cisco in a thought-provoking webinar that delves into the heart of Zero Trust and its transformative impact on security and compliance. We will chart the path to compliance modernization, demonstrating how Zero Trust forms the bedrock of an advanced, data-driven security architecture. This session empowered IT professionals, compliance officers, and corporate leaders to align...
Add Favorite
Tech on Tap: F5 Future Proofing Your Ap...
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
Back to Search Begin New Search