Back to Search Begin New Search Save Search Auto-Notify
What You Need to Know About the Threat...
Zero-trust cybersecurity has been the Administration’s goal for a few years now. So that begs the question, what are the current and most pressing threats that are waging war against the zero-trust methodology? Join us online Wednesday, Feb. 7 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government and industry experts about the current threat landscape and what should be on your radar for 2024.
February 7, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
Zero Trust Lab Phase 2: Lumen and Partners
As a leading provider of Networking and Technology Solutions, Lumen uniquely delivers on the promise of Zero Trust today and provides a vision for the future where security is built into the network fabric and where the network itself combined with the strengths of Zero Trust architectures bring an optimal state of an asset and data-aware security framework. Working with ATARC in delivering scenarios that represent government and industry-wid...
January 19, 2024
Organizer: ATARC
Location: Virtual
Add Favorite
Level Up Your Cloud Security with Zero...
So you’ve moved your mission-critical applications and workloads to the cloud. That’s a net benefit when it comes to saving your organization money and increasing its flexibility – but when it comes to improving your security, it’s not so cut-and-dried. The cloud expands your attack surface, and the more users you have, the easier it is for attackers to sneak into your environment via misapplied security settings and in...
January 11, 2024
Organizer: 1105 Media, Inc.
Location: Virtual
Add Favorite
Coffee & Conversation with Dr. Adele Merritt
Join colleagues online on Thursday, December 7, from 9:00-9:45 am ET for a virtual Coffee & Conversation with Dr. Adele Merritt, Intelligence Community Chief Information Officer, Office of the Director of National Intelligence (ODNI). This is the first of our three-part Data and Quantum Computing series, sponsored by Microsoft. Moderated by INSA's Executive VP John Doyon, topics for discussion include: Zero Trust Adapting to and addressing...
December 7, 2023
Organizer: Intelligence and National Security Alliance
Location: Virtual
Add Favorite
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. This slogan fits into the Department of Defense mindset, which is always focused on how to reduce risk, but it’s a challenge to apply it to the federal government’s largest agency. An important tool in pursuing zero trust is to implement microsegmentation – partitioning a network into small, isolated sections to reduce the attack surface in e...
November 28, 2023
Organizer: FedInsider
Location: Webcast
Add Favorite
Welcome to the CSA Zero Trust Summit
The Zero Trust model, which operates on the principle of ‘never trust, always verify,’ is quickly rising as the favored strategy to protect important assets. CSA’s Virtual Zero Trust Summit, taking place November 15-16, 2023, will deliver the knowledge needed to understand the core concepts of Zero Trust. Featuring prominent industry leaders such as John Kindervag, the founder of Zero Trust philosophy, the Summit will provide...
November 15-16, 2023
Organizer: Cloud Security Alliance
Location: Virtual
Add Favorite
Zero Trust Implementation
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed, time-consuming, and agency...
November 15, 2023
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Advanced Data Protection with Vault: Ha...
Join HashiCorp for a hands-on workshop on zero trust, identity-based security. During this workshop, participants will learn about the HashiCorp security model, which is predicated on the principle of identity-based access and security. In order for any machine or user to do anything, they must authenticate who or what they are, and their identity and policies define what they’re allowed to do. After an overview of zero trust security, p...
November 15, 2023
Organizer: HashiCorp
Location: Virtual
Add Favorite
New and Next: Driving for Automation
Federal civilian agencies and the services continue to seek ways to boost efficiency and improve operations while enhancing the security of their operational networks and IT infrastructure. At the same time, the drive for automation presents the opportunity to empower AI and ML tools to better secure both OT and IT, freeing up personnel for higher-level work. Various initiatives and mandates – from CISA’s CPGs and Zero Trust model...
November 14, 2023
Organizer: MeriTalk
Location: Virtual
Add Favorite
ATARC Zero Trust Lab Phase 2 Demonstrat...
In collaboration with ATARC, RavenTek will proudly demonstrate proficiency in the scenarios outlined by the Zero-Trust Working Group, as well as a few scenarios of our own, by harnessing the capabilities of industry-leading vendors. As we journey forward beyond this Phase 2 lab, RavenTek will continue to unveil novel scenarios and perpetually refine our architecture, reinforcing our position at the bleeding edge of zero-trust technology integration.
October 20, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
Back to Search Begin New Search