Virtual Roundtable: How to Migrate Work...
Join AWS, stackArmor and Carahsoft for a virtual roundtable on Tuesday, September 13th, at 2:00pm ET as we discuss migrating your workloads to the Cloud securely and easily. During this roundtable attendees will learn about the benefits of the AWS Cloud to meet the stringent security requirements necessary for protecting sensitive data. This interactive roundtable can help early starters of the Cloud with foundational use cases. If you are a f...
Top 10 Things You Didn't Know About Ent...
If Zero Trust, flexible deployments, customer service, or simplifying your journey to the cloud matter to you, there are 10 things you may not know about Symantec – but you should.The security landscape continues to evolve at a blistering pace, and there are so many great things going on with Symantec, it’s sometimes hard to keep track. Meanwhile, what you may have heard from the newest kids on the block is often meant to seed fea...
SASE Converge 2022
The concept of work has been completely transformed. It is no longer a location, but an activity. This new era of hybrid work means a new generation of never-before-seen threats. Is your network ready? To succeed in this new world, we need to reimagine our infrastructure to support the flexibility demanded by the modern workforce - without compromising security or user experience. ZTNA 2.0 provides you a critical first step in accomplishing a...
Network Security 2022 Bonus Session: Ze...
The Zero Trust framework is based on the principle of "never trust, always verify." Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.
Demystifying Zero Trust for Government...
Is your agency worried about Zero Trust compliance, with zero plan in place? You’re not alone. In this webinar, Pluralsight’s Sr. Security Author Brandon DeVault breaks down what you need to know about Zero Trust so your team—and your tech—are ready for it. Don’t worry. It’s not as daunting as it seems. You’ll learn how to: Create an action plan and timeline for your workforce to comply with the recent...
August 25, 2022
Organizer:
Pluralsight Location:
Webcast
Implementing Proactive Security with Ze...
As Security, Compliance, Identity and Management continue to be paramount in the way our Federal Government innovates and moves toward secure cloud services, Microsoft is committed to supporting and empowering agencies efforts to implement proactive security by delivering best of breed security across all devices, platforms and endpoints. It is critical that agencies are enabled to rapidly assess and improve their security posture and with the...
Building Cyber Resilience to Third-Part...
Organizations of any size go through various vendors to keep operations running and without proper controls in place, leaves organizations vulnerable to third-party breaches that may result in loss of data, downtime as well as financial losses. While third-party risk management is not a new concept, the risk of cyberattacks today is even greater as companies accelerate their digital capabilities post-pandemic. It is important for organizations...
July 19-21, 2022
Organizer:
IQPC Location:
Virtual
Army Tech Talk: Build a Zero Trust Arch...
Join this session to see capability demonstrations and learn how to comply with requirements under the Executive Order, including: Native Encryption, Key Management, and Multi-factor Authentication Auditing & Logging: Audit logs can be forwarded for collection and analysis to internal SIEMs for retention and analysis Optimize Virtualization and Infrastructure Management with predictive analytics and task automation. Network Segmentation: D...
July 5, 2022
Organizer:
NUTANIX Location:
Webcast
Zero Trust Cyber Exchange
The clock is ticking. Agency IT and security teams have until August 2024 to implement zero trust architectures (ZTAs), as directed by the Biden administration executive order on improving the nation’s cybersecurity. The goal? To increase their security rigor as the perimeters of federal networks have become increasingly dynamic, and to defend against persistent threat campaigns aimed at government systems, networks, users and data. Over...
Data-Driven Government: Best Practices...
Join us for a panel discussion where we will feature leaders from government, education, and industry. During this webinar we will cover the following topics including: Emerging trends and best practices in government and education from around the USA -Data automation and staff augmentation The reality of zero trust Legacy systems, cloud and AI Citizen experience, chatbots and APIs -The decade of tech and the future of data-driven government D...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.