Back to Search Begin New Search Save Search Auto-Notify
Identity Governance & Zero Trust: Best...
Managing identities and access across Microsoft Entra ID, Google Cloud, and AWS is a growing challenge for government agencies at all levels. Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. But the benefits carry their own drawbacks, including the need to m...
October 29, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Accelerating Cloud Migration for Agencies
Migrating to the cloud is not simple, especially if an agency wants to establish a multi-cloud environment that can support a growing number of apps and a wide range of services. Migration requires eliminating IT silos, a unified management and control system, automation of tasks, being able to extend and migrate apps and data in all the clouds in use, and more. Solutions have emerged that aim to simplify administration, improve resilience, an...
October 24, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Creating a Zero Trust Ecosystem
Zero Trust (ZT) is a cybersecurity framework that automates an organization’s security architecture and orchestrates a response as soon as systems are attacked. This is why ZT is the core of “Improving the Nation’s Cybersecurity,” the Executive Order issued in May 2021 requiring agencies to implement a zero trust architecture for their IT systems. The challenge, however, lies in implementing a complete solution guided b...
October 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Building Zero Trust on a Sound Foundation
Executive Order 14028 mandates agencies implement zero trust (ZT) architectures for all cyber networks. Zero trust relies on a full understanding of the cyber attack surface in order to move the boundary closer to the user and secure each component. After all, you can’t secure what you don’t know you have. Many agencies are still struggling to answer simple questions: What devices have access to our environments? Is the core softwa...
October 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Experience the Cosmos Online
Are you ready to venture into the vast beyond? The next great adventure in AI is upon us, and it promises to be more inspiring, more revolutionary and more empowering than anything we’ve seen so far. Don't miss the opportunity to meet our leaders and discover why the world’s AI deployments run on VAST. Learn how we can efficiently operationalize your entire AI pipeline. Join us virtually on October 1 at 11AM EST.
October 1, 2024
Organizer: VAST Data
Location: Virtual
Add Favorite
Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration with Available Networks, Darktrace Federal, Walacor Corporation, and Technology Partners. Available Networks was created to build a national security grade private networking environment designed and integrated to meet the standards, methods and best practices defined by the Zero Trust Architectures from NIST, CISA and the U.S. Department of Defense. That solution, ZTNS, is currently being de...
September 13, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Next in Zero Trust - Visibility and Sto...
The zero-trust approach to cybersecurity starts with an assumption that breaches will occur, whether from inside or outside the organization. Much like any other type of organization, federal agencies have multiple attack avenues — multiple endpoints per user, internet of things devices and hybrid infrastructures of data centers, edge computing, and numerous commercial clouds. How are agencies ensuring their zero-trust strategy goes beyo...
August 13, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
North, South, East, West: Navigating th...
Federal CIOs know the days of protecting a network perimeter are gone — firewalls were never designed to address edge computing, remote work, hybrid clouds, or multiple devices used by a single person. This is why all Federal agencies were directed by Executive Order 14028 and the follow-up Office of Management and Budget memo laying out a Zero Trust Strategy to implement a Zero Trust architecture by the end of September 2024. With that...
July 24, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search