Building on the Zero Trust Foundation
Federal agencies have spent the last several years putting their Zero Trust (ZT) architecture in place as the foundation for a “never trust, always verify” cybersecurity strategy. The Continuous Diagnostics and Mitigation (CDM) program at the Cybersecurity and Infrastructure Security Agency (CISA) has been a key facilitator for agencies pursuing ZT, since continuously identifying and fixing cybersecurity threats is one of CISA...
March 25, 2025
Organizer:
FedInsider Location:
Webcast
F5 API Security & Observability Workshop
Attendees will join Peter Scheffler, Sr. Solutions Architect at F5, and Jay Peņa, Solutions Engineer at F5, for a hands-on interactive workshop focused on API security and cybersecurity best practices. Hosted at the Cyber Bytes Foundation's Quantico Cyber Hub, this workshop provides participants with the opportunity to deepen their knowledge, uncover vulnerabilities, and develop actionable strategies to better protect their APIs. Attendees who...
Zero Trust: Improving Your Business Con...
Using a Zero Trust (ZT) architecture for cybersecurity has become essential throughout the public sector, because it both strengthens cyber defenses and enables continuity of operations in the event of an attack. It further benefits an agency by reducing the time lost and lowering the cost of recovery. Working in a ZT-based environment makes the addition of innovative technologies such as cloud computing and AI safer; every new technology intr...
March 31, 2025
Organizer:
FedInsider Location:
Webcast
3rd Annual DoD Zero Trust Symposium
Our third annual virtual symposium features more than 40 speakers from government, industry and academia who will highlight the progress DoD has made in implementing Zero Trust. We will share lessons learned, steps to Zero Trust maturity and ways to modernize Zero Trust implementation. Whether you are just beginning your Zero Trust journey or are well down the path, this symposium will energize and equip you for the road ahead. Don't miss one...
April 2-4, 2025
Organizer:
ATARC Location:
Virtual
CyberSmart 2025: From A to Z
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office. For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to...
April 3, 2025
Organizer:
FedInsider Location:
Reston, VA
Getting Government Agencies to Secure P...
Join RSA & Carahsoft to gain valuable insights from a leading cybersecurity expert and learn how your agency can effectively implement passwordless authentication while meeting critical compliance requirements.
The Future of ID Management: Public Sec...
As the public sector continues to embrace digital transformation and zero trust security environments, the need for robust identity management is paramount. “The Future of Identity Management: Public Sector Best Practices” virtual workshop will explore cutting-edge strategies and solutions that ensure secure and efficient identity verification and management. Attendees will gain an understanding of how to implement best practices t...
Securing Classified Data from the Edge...
Sharing classified data securely across cloud, undersea cables, cellular, and space-based communications networks, remains a challenge for Mission Commanders and Intelligence Analysts. Their missions require the rapid amalgamation of diverse and disparate data sets for analysis and secure dissemination. This necessitates systems that are able to protect data in transit and at rest, from the edge to the operations center, anywhere in the world...
Zero Trust Implementations Lessons Learned
The “Zero Trust Implementation Lessons Learned” virtual workshop will delve into the critical lessons and best practices derived from real-world Zero Trust security implementations within government agencies. As cyber threats continue to evolve, the need for a robust and adaptable security framework becomes paramount. Our subject matter experts will share their experiences, challenges, and successes in adopting Zero Trust principle...
Beyond Human Access: Securing the AI ...
State and local governments are facing a seismic shift in digital security. The traditional focus on human access is no longer sufficient. With the rapid proliferation of machine identities and the impending rise of AI agents, public sector organizations are grappling with unprecedented challenges. Uncontrolled access from these non-human entities creates significant vulnerabilities, increasing the risk of data breaches and compliance violatio...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.