Back to Search Begin New Search Save Search Auto-Notify
Achieving Zero Trust Zero Fail Defense...
While the term “zero trust" is overused in security product marketing, Zero Trust is very important to the future of our nation's cybersecurity. The Department of Defense (DoD) released its own Zero Trust architecture guidance and there are many additional relevant models available to federal customers. Last May, President Biden issued an Executive Order (EO) which required agencies to provide updates on their plans to implement Zero Tru...
October 19, 2021
Organizer: AFCEA
Location: Webcast
Add Favorite
Accelerating Government IT Innovation a...
Application modernization is a key consideration when switching from on-premises systems to the public cloud, whether the impetus is a cloud-first directive or a push from within IT to digitize legacy systems. It can reduce operational overhead, replace obsolete technologies and improve user experience. Listen as topic experts dive into why modernizing cloud applications is important for cloud migration. When taking on the task of modernizing...
October 19, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
The Journey to Zero Trust
Zero Trust can be a confusing concept for many organizations, especially for those that are at an early stage of its adoption. Zero Trust solutions protect networks, applications, and data based on the concept of "never trust, always verify." In a Zero Trust environment, identity is the core security control used by security teams that "assume breach" because any user or device is a potential threat actor. Join us on October 14th for a live we...
October 14, 2021
Organizer: Cybersecurity Government Team at Carahsoft
Location: Webcast
Add Favorite
Advancing Security Within The Federal G...
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Tune into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. Zero Trust security is a framework of policies, technologies, and systems that are applied to users and devices. Hear...
October 14, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Security Where it Matters: Stay Protect...
VMware’s software portfolio is critical to milCloud® 2.0’s ecosystem. This partnership brings industry experts together to help partners migrate their workflows from on-premise to the cloud, quickly and securely. In this webinar, you will learn: The full scope of milCloud® 2.0 capabilities, a cloud software specifically designed for the warfighter How to utilize milCloud® 2.0 as a business management portal and unique p...
October 14, 2021
Organizer: VMware Government Team at Carahsoft
Location: Webcast
Add Favorite
Making Zero Trust A Reality: Investing...
CyberRes is sponsoring this year's AFCEA Bethesda Webinar Series. Register now to hear John Fanguy, Chief Technology Officer of CyberRes, speak on Zero Trust Architecture and how agencies are incorporating migrations steps laid out by the National Institute of Standards and Technology (NIST). Experts will speak on the time, money, and intense focus needed to make Zero Trust a reality. Join AFCEA Bethesda and CyberRes for a webinar on October 1...
October 13, 2021
Organizer: AFCEA Bethesda Government Team at Carahsoft
Location: Webcast
Add Favorite
Connect-the-Dots Between Today and a Ze...
First defined over two decades ago, zero trust has substantially picked up steam in recent years. President Biden’s Executive Order on Improving the Nation’s Cybersecurity has taken it a step further by codifying zero trust as the Federal Government’s security architecture of choice. Nearly every agency desires to achieve zero trust, but the gap between their existing environments and the ideals they read about leave most st...
October 13, 2021
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Cyber Security Virtual Conference: Ransomware
Ransomware is a form of malware designed to encrypt data files rendering any files on the computing device unusable. Once files are encrypted a ransom is demanded in exchange for decryption keys. Ransomware is a major ongoing security problem and a growing national security threat. Government agencies are organizing on numerous fronts to combat ransomware. On July 15, 2021 the U.S. Government launched a new One-Stop Ransomware resource at stop...
October 7, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Zero Trust Journey
Zero Trust Architecture adoption is a challenge for many organizations. It isn't a specific technology to adopt; instead, it’s a security initiative that an enterprise must understand, interpret, and implement. Enterprise security initiatives are never simple, and their goal to improve the enterprise’s cybersecurity posture requires the alignment of multiple stakeholders, systems, acquisitions, and exponentially changing technology...
October 7, 2021
Organizer: CMU - SEI
Location: Webcast
Add Favorite
South Central Webinar Series: Securing...
Join Google Cloud and Carahsoft to learn about BeyondCorp Enterprise—a zero trust solution, delivered through Google's global network, that enables secure access to applications and cloud resources with integrated threat and data protection. It is a modern, Zero Trust platform which allows your employees and extended workforce to access applications in the Cloud or on-premises and work from anywhere without a traditional remote-access VP...
October 7, 2021
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search