Securing CAD Designs for Defense Contra...
In today’s defense industrial base, CAD files are the lifeblood of critical design projects, making their security a top priority. This webinar focuses on the specific cybersecurity challenges and solutions for CAD users working with defense contractors. CISOs and Senior Cybersecurity Managers will learn how to meet stringent defense-related requirements, protect sensitive designs, and ensure compliance with CMMC 2.0. Key Topics: Meetin...
November 7, 2024
Organizer:
Secude Location:
Webcast
Fall Cyber Solutions Fest: Zero Trust
In an era where cyber threats constantly evolve and the boundaries of organizations become increasingly porous, the principle of "Never Trust, Always Verify" has become more relevant than ever. The Zero Trust Solutions Forum 2024 aims to bring together top industry vendors to shed light on the newest developments, technologies, and best practices in the realm of Zero Trust. Participants will gain invaluable insights into: Emerging Technologies...
Meeting 2027 DoD Zero Trust Mandate: Id...
The looming 2027 DoD Zero Trust mandate is top of mind for many. The strategy outlines, among many capabilities, the requirement for Privileged Access Management (PAM). Most agencies, having submitted at least one rev of their I-Plans, are actively investigating which PAM solutions best fit the needs of their organization. This can be a complex process. Join BeyondTrust and Red River on November 13 for a discussion on how to identify the key t...
28th Colloquium: Building a Resilient C...
The 2024 Colloquium for Information Systems Security Education (CISSE) celebrates its 28th anniversary as the premier Cybersecurity Education Conference. Join us to explore the latest trends in cyber education and engage with SME's from academia, government, and industry. This year's conference will convene in Tampa, Florida, from November 13th to 15th, 2024. We are delighted to welcome The University of Tampa as our esteemed host and academic...
Innovation Summit: Riding the Wave of T...
While the IT universe has always been a rapidly evolving environment, it often has changed in an expected way – more speed, more capacity, less latency, for example, building on what came before. Occasionally, however, disruptive new technology or a major strategic shift in thinking is introduced and it takes a long time for the reverberations to be absorbed and the ecosystem to adjust to the new circumstances. Over the past three years,...
November 14, 2024
Organizer:
FedInsider Location:
Washington, DC
Cyber Ready by 2025: Fast-Tracking the...
As the federal government accelerates its digital transformation efforts, it is critical for civilian agencies to stay ahead of emerging cybersecurity threats. With 2025 around the corner, federal agencies need to prioritize addressing their most pressing cybersecurity needs before the new year. During this webcast, join Presidio Federal, IBM, and GovExec as we bring together private and public sector cybersecurity experts to explore the urgen...
Building Zero Trust on a Sound Foundation
Executive Order 14028 mandates agencies implement zero trust (ZT) architectures for all cyber networks. Zero trust relies on a full understanding of the cyber attack surface in order to move the boundary closer to the user and secure each component. Afterall, you can’t secure what you don’t know you have. Many agencies are still struggling to answer simple questions: What devices have access to our environments? Is the core softwar...
November 20, 2024
Organizer:
FedInsider Location:
Webcast
Overcoming Zero Trust Challenges in Fed...
As federal agencies advance toward implementing Zero Trust Architecture (ZTA), the path is often met with challenges ranging from managing access controls to ensuring continuous monitoring and policy enforcement. Join us to learn how ServiceNow offers a powerful, integrated platform designed to meet these needs, supporting agencies in achieving ZTA compliance and enhancing security resilience. Join our upcoming webinar to learn how ServiceNow...
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way. Join CyberArk and Optiv + ClearShark's leaders on December 5th as they share insights and "confessions" into implementing Zero Trust security principles, emphasizing that it...
2025 SANS Zero Trust Survey Webcast ...
As digital transformation accelerates, Zero Trust has become crucial for defending against an increasingly complex threat landscape. The rise in ransomware, credential stealers, supply chain attacks, and disruptive incidents impacting availability in 2024 has underscored the need for resilient cybersecurity strategies that can withstand and adapt to evolving threats. Our 2025 survey focuses on how Zero Trust principles, such as identity manage...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.