Back to Search Begin New Search Save Search Auto-Notify
ATARC Federal Zero Trust Summit 2024
In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to s...
March 13, 2024
Organizer: ATARC
Location: Washington, DC
Add Favorite
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. Join us to learn how this technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At...
March 13, 2024
Organizer: Gigamon Government Team at Carahsoft
Location: Webcast
Add Favorite
Climbing the Mountain: A New Era for Go...
In an era where cyber threats are increasingly sophisticated, the need for robust cybersecurity strategies in government IT departments is more pressing than ever. These threats are continuously evolving, leveraging new technologies and exploiting vulnerabilities in innovative ways. As a result, there is an urgent need for IT sectors to adapt and enhance their cybersecurity strategies. This adaptation isn’t just about implementing new te...
March 7, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Forensics in the CISA Incident Response...
The Cybersecurity and Infrastructure Incident Response and Vulnerability playbook released by the Cybersecurity and Infrastructure Security Agency (CISA) in November 2021 lays out a detailed plan for how agencies should implement communication, technology, and policy for Incident response. Forensic collection, preservation, analysis, and reporting are important parts of this playbook. This presentation will discuss the Incident Response playbo...
March 7, 2024
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
OpenText Government Summit
Leaders across the federal government are under pressure to deliver on an ever-expanding mission with limited resources. Doing so requires the modernization of systems and processes to connect data, content, and applications to maximize existing infrastructure investments and enhance information availability, value, and security. With countless directives and executive orders on everything from cybersecurity and data sharing to improving the c...
March 5, 2024
Organizer: GovExec 360
Location: Tysons, VA
Add Favorite
Securing the Cyber/Software Supply Chain
Executive Order 14028 (Improving the Nation’s Cybersecurity) established new requirements to secure the federal government’s software supply chain. The requirements involved systematic reviews, process improvements, and security standards for both software suppliers and developers, in addition to customers who acquire software for the federal government. The software supply chain is only truly secure when all entities throughout t...
February 29, 2024
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Zero Trust World 2024
Learn from experts, learn from peers, and expand your network in a fun environment with three days designed to improve your knowledge and skills as an IT professional. Onsite you'll choose from a variety of sessions with topics to help you today and in the future. Cybersecurity sessions are CPE eligible. The daily schedule includes mornings in the Mainstage with keynotes and subject matter experts providing insight into threats and technology....
February 26-28, 2024
Organizer: ThreatLocker
Location: Orlando, FL
Add Favorite
Cybersecurity Summit 2024
Public sector organizations continue to face a constant barrage of sophisticated cyber threats. And with new cybersecurity mandates and guidance — from recent executive orders to the release of the 2023 National Cyber Strategy — public sector leaders must make considerable decisions about their cyber enterprise that will have lasting impacts for years to come. On top of this, the emergence of novel security capabilities built on ma...
February 27, 2024
Organizer: FEDSCOOP
Location: Washington, DC
Add Favorite
Rise of the Machines! Zero Trust Consid...
In today’s world, we’re constantly hearing about new tech terms and breakthroughs, from artificial intelligence (AI) to Zero Trust security. Government organizations are always trying to keep up, looking for quicker and smarter ways to get things done and keep their information safe. AI has been a big help, making tasks faster to complete than ever before. But, this progress comes with its own set of questions. What are the downsid...
February 22, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
NASA Splunking into Zero Trust
Join us to explore how Splunk can empower NASA's Zero Trust (ZT) initiative and strengthen its security framework. Splunk's cutting-edge technology seamlessly reinforces the "cross-cutting capabilities" outlined in CISA's Zero Trust Maturity Model, covering vital elements such as enhanced visibility and analytics, efficient automation and orchestration, and robust governance. Splunk efficiently integrates these technologies to offer a compreh...
February 20, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search