Zero Trust Implementation: Update
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principles of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer:
ATARC Location:
Webcast
Evolving from Disjointed Views to Cohes...
Join Riverbed and Carahsoft for a live webinar exploring the need for comprehensive visibility across modern federal networks. Federal networks are complex and continually expanding, encompassing not only infrastructure layers but also end users, devices and applications. With the addition of emerging challenges such as compliance with zero-trust and end-user experience initiatives, many federal agencies find themselves relying on solutions t...
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
Enterprise Education Series: Pillars of...
Mark your calendar and join us for the next installment of our Enterprise Education Series! The topic will be the Pillars of Zero Trust, and attendees will receive 1 CLP for attending. The Enterprise Education Series is designed to: Expand your awareness of innovative contract solutions Help you drive transformative outcomes Provide you with direct points of contact for support and additional education Our upcoming event is a solutions-focused...
Unknown Assets are the Achilles Heel of...
Achieving complete visibility across complex federal environments is at the crux of effective defense against today’s relentless threat landscape, as well as a core tenet of zero trust and compliance. Yet gaining an in-depth, accurate inventory of all IT, OT, IoT, mobile, and remote assets has proven elusive for many federal agencies despite deploying tools to this end. Existing solutions have consistently failed to uncover risky unknown...
Automate Your Zero Trust Workflow
During this webinar, Zack and Willie will discuss: How PC Matic's innovative technology modernizes traditional Software Bill of Materials (SBOM), Zero Trust, CDM, and Secure by Design initiatives How the solution streamlines Zero Trust policy enforcement points, simplifying governance processes while bolstering compliance efforts. How the solution integrates seamlessly into existing infrastructures, optimizing operations without solution d...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.