Back to Search Begin New Search Save Search Auto-Notify
Identity Governance & Zero Trust: Best...
Managing identities and access across Microsoft Entra ID, Google Cloud, and AWS is a growing challenge for government agencies at all levels. Distributing agencies’ application infrastructure and workloads among different clouds has benefits, such as greater resilience, targeted cost management, and greater flexibility in the future by avoiding lock-in with one provider. But the benefits carry their own drawbacks, including the need to m...
October 29, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
DoDIIS 2024 Executive Briefing Series w...
Trend Micro and Carahsoft are excited to invite you to DoDIIS 2024 for our first-ever Executive Briefing Series. This series will provide the tools to help your team explore how to innovate, adapt, and collaborate to enhance your agency's cybersecurity. Adversaries are infiltrating networks and moving laterally within their victims' systems, employing a variety of tools, tactics, and procedures (TTPs) in their attacks. In this session, we...
October 29, 2024
Organizer: Trend Micro Government Team at Carahsoft
Location: Omaha, NE
Add Favorite
Accelerating Cloud Migration for Agencies
Migrating to the cloud is not simple, especially if an agency wants to establish a multi-cloud environment that can support a growing number of apps and a wide range of services. Migration requires eliminating IT silos, a unified management and control system, automation of tasks, being able to extend and migrate apps and data in all the clouds in use, and more. Solutions have emerged that aim to simplify administration, improve resilience, an...
October 24, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Creating a Zero Trust Ecosystem
Zero Trust (ZT) is a cybersecurity framework that automates an organization’s security architecture and orchestrates a response as soon as systems are attacked. This is why ZT is the core of “Improving the Nation’s Cybersecurity,” the Executive Order issued in May 2021 requiring agencies to implement a zero trust architecture for their IT systems. The challenge, however, lies in implementing a complete solution guided b...
October 23, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CompTIA's 2025 State of Cybersecurity R...
As cyber threats continue to rise, understanding how you can ensure secure operations, secure data to drive AI and analysis, and build cybersecurity expertise within your agency will be crucial. Get exclusive access to research-backed data and actionable insights to bolster your cybersecurity posture by joining CompTIA's 2025 State of Cybersecurity Report Webinar. This session features Seth Robinson, Vice President of Industry Research at Comp...
October 22, 2024
Organizer: CompTIA
Location: Webcast
Add Favorite
Building Zero Trust on a Sound Foundation
Executive Order 14028 mandates agencies implement zero trust (ZT) architectures for all cyber networks. Zero trust relies on a full understanding of the cyber attack surface in order to move the boundary closer to the user and secure each component. After all, you can’t secure what you don’t know you have. Many agencies are still struggling to answer simple questions: What devices have access to our environments? Is the core softwa...
October 17, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
GPSEC Public Sector Cybersecurity Excha...
We are excited to announce the inaugural GPSEC Public Sector Cybersecurity Exchange Conference, which will take place on Wednesday, October 16th, 2024.This premier nationwide event is now offered to the U.S Public Sector community and is set to gather government and industry attendees. Focusing on Zero Trust, this event aims to be a significant step in our continuous efforts to enhance cybersecurity and provide education on Zero Trust principl...
October 16, 2024
Organizer: GuidePoint Security LLC
Location: McLean, VA
Add Favorite
ATARC's Federal Zero Trust Summit
Amidst the ever-shifting digital terrain, federal agencies confront a multitude of cyber challenges, necessitating a proactive stance towards resilience. As cyber threats evolve, agencies must continuously adapt their defenses, remaining vigilant against emerging risks and vulnerabilities. Compliance and regulatory frameworks further complicate the landscape, demanding constant policy refinement to uphold standards and safeguard sensitive info...
October 3, 2024
Organizer: ATARC
Location: Reston, VA
Add Favorite
Workshop Identity Security
Identity is at the center of cybersecurity. With zero trust now the mandated de facto approach to strengthening cyber defenses, federal agencies need to build an identity-centric security approach encompassing both human and machine identities. This requires an enterprise wise rethinking of authentication, authorization, access to data, auditing and accountability in order to protect the IT backbone powering government. Identity is also at the...
August 14, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Next in Zero Trust - Visibility and Sto...
The zero-trust approach to cybersecurity starts with an assumption that breaches will occur, whether from inside or outside the organization. Much like any other type of organization, federal agencies have multiple attack avenues — multiple endpoints per user, internet of things devices and hybrid infrastructures of data centers, edge computing, and numerous commercial clouds. How are agencies ensuring their zero-trust strategy goes beyo...
August 13, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Back to Search Begin New Search