18 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Identity - One Critical Element of CISA...
When the Cybersecurity and Infrastructure Security Agency (CISA) released its Zero Trust Maturity Model Version 2.0 in April, it identified access management as a core function within the Identity Pillar. Identity is the very first of five such pillars, and brings the need for privileged access management into clear focus. Identity is defined by CISA as “an attribute or set of attributes that uniquely describes an agency user or entity,...
August 22, 2023
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Accelerating Zero Trust with Complete I...
To advance Zero Trust mandates, federal IT leaders need an accurate, trusted, and complete picture of their entire IT estate. Attend this webinar to learn how your agency can better comply with OMB’s January 2022 memo, M-22-09, Moving the U.S. Government Toward Zero Trust Cybersecurity Principles. Attendees will hear how to develop a real-time situational awareness and understanding of everything on their networks, whether they are based...
May 18, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
A Zero Trust Approach to Securing your...
Join us to learn how to secure smart medical devices in your ecosystem using a Zero Trust approach! We have a great agenda lined up including a fireside chat with Ryan Kramer, Enterprise Infrastructure Architect for the State of North Dakota, who will be sharing his expertise and best practices in securing IoT devices. In this webinar we’ll discuss: The unseen and exponential risk to healthcare networks resulting from the massive prolife...
April 13, 2023
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Tactics for Web App Security Using Zero...
Zero trust architecture at its core increases cyber defenses and reduces threats to data exposure, which is more critical than ever as web applications remain a top attack vector for gaining access to sensitive systems and information; attacks on web apps increased from 31.5% in 2020 to 53.6% in 2021, according to Kapersky. Fortunately, new guidance from the Department of Defense (DoD) presents seven pillars that are critical to ZTA success ...
January 26, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Enhance and Extend: Zero Trust Principl...
Approaching the one-year anniversary of the Office of Management and Budget’s memorandum on “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles,” this session will reflect on how agencies are meeting the specific criteria while utilizing ZT architecture. OMB’s memorandum involves centralizing identity management to provide enterprise identity and access management services to reduce the burden on agen...
December 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
Accelerating Zero Trust Implementations...
OMB’s memorandum M-22-09, “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles,” is setting deadlines for implementation across the government. Specifically, the memo calls out the end of FY24 – an extremely short time frame in government circles – for multiple actions across the CISA-defined five pillars of a Zero Trust Architecture. One of the most important actions is for agencies to move to...
July 7, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Strengthening Cybersecurity in State an...
Most IT leaders acknowledge the growing threat from ransomware, however many state and local governments are unprepared to prevent or respond to it. When an agency does not know the blast radius of an attack, whether sensitive data is affected, or how long it may take to recover, the only option they are often left with is to pay up. In order to protect themselves against an organized, well-resourced attacker agencies need a strong security po...
June 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Executive Order 14028 is Driving Legacy...
The clock's been ticking - Federal agencies are reaching the end of the first year of President Biden's signed Executive Order 14028, "Improving the Nation's Cybersecurity; Transforming Government Through Technology-Driven initiatives," on May 12, 2021. Join our complimentary webinar as we discuss this executive order which aims to tighten federal agency cybersecurity by requiring all federal government agencies to adopt multifactor authentica...
June 8, 2022
Organizer: Archive360 Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search