Achieving Zero Trust Zero Fail Defense...
While the term “zero trust" is overused in security product marketing, Zero Trust is very important to the future of our nation's cybersecurity. The Department of Defense (DoD) released its own Zero Trust architecture guidance and there are many additional relevant models available to federal customers. Last May, President Biden issued an Executive Order (EO) which required agencies to provide updates on their plans to implement Zero Tru...
October 19, 2021
Organizer:
AFCEA Location:
Webcast
Accelerating Government IT Innovation a...
Application modernization is a key consideration when switching from on-premises systems to the public cloud, whether the impetus is a cloud-first directive or a push from within IT to digitize legacy systems. It can reduce operational overhead, replace obsolete technologies and improve user experience. Listen as topic experts dive into why modernizing cloud applications is important for cloud migration. When taking on the task of modernizing...
October 19, 2021
Organizer:
ATARC Location:
Webcast
The Journey to Zero Trust
Zero Trust can be a confusing concept for many organizations, especially for those that are at an early stage of its adoption. Zero Trust solutions protect networks, applications, and data based on the concept of "never trust, always verify." In a Zero Trust environment, identity is the core security control used by security teams that "assume breach" because any user or device is a potential threat actor. Join us on October 14th for a live we...
Advancing Security Within The Federal G...
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Tune into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. Zero Trust security is a framework of policies, technologies, and systems that are applied to users and devices. Hear...
October 14, 2021
Organizer:
ATARC Location:
Webcast
Security Where it Matters: Stay Protect...
VMware’s software portfolio is critical to milCloud® 2.0’s ecosystem. This partnership brings industry experts together to help partners migrate their workflows from on-premise to the cloud, quickly and securely. In this webinar, you will learn: The full scope of milCloud® 2.0 capabilities, a cloud software specifically designed for the warfighter How to utilize milCloud® 2.0 as a business management portal and unique p...
Making Zero Trust A Reality: Investing...
CyberRes is sponsoring this year's AFCEA Bethesda Webinar Series. Register now to hear John Fanguy, Chief Technology Officer of CyberRes, speak on Zero Trust Architecture and how agencies are incorporating migrations steps laid out by the National Institute of Standards and Technology (NIST). Experts will speak on the time, money, and intense focus needed to make Zero Trust a reality. Join AFCEA Bethesda and CyberRes for a webinar on October 1...
Connect-the-Dots Between Today and a Ze...
First defined over two decades ago, zero trust has substantially picked up steam in recent years. President Biden’s Executive Order on Improving the Nation’s Cybersecurity has taken it a step further by codifying zero trust as the Federal Government’s security architecture of choice. Nearly every agency desires to achieve zero trust, but the gap between their existing environments and the ideals they read about leave most st...
Cyber Security Virtual Conference: Ransomware
Ransomware is a form of malware designed to encrypt data files rendering any files on the computing device unusable. Once files are encrypted a ransom is demanded in exchange for decryption keys. Ransomware is a major ongoing security problem and a growing national security threat. Government agencies are organizing on numerous fronts to combat ransomware. On July 15, 2021 the U.S. Government launched a new One-Stop Ransomware resource at stop...
Zero Trust Journey
Zero Trust Architecture adoption is a challenge for many organizations. It isn't a specific technology to adopt; instead, it’s a security initiative that an enterprise must understand, interpret, and implement. Enterprise security initiatives are never simple, and their goal to improve the enterprise’s cybersecurity posture requires the alignment of multiple stakeholders, systems, acquisitions, and exponentially changing technology...
October 7, 2021
Organizer:
CMU - SEI Location:
Webcast
South Central Webinar Series: Securing...
Join Google Cloud and Carahsoft to learn about BeyondCorp Enterprise—a zero trust solution, delivered through Google's global network, that enables secure access to applications and cloud resources with integrated threat and data protection. It is a modern, Zero Trust platform which allows your employees and extended workforce to access applications in the Cloud or on-premises and work from anywhere without a traditional remote-access VP...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.