Back to Search Begin New Search Save Search Auto-Notify
SASE Converge 2022
The concept of work has been completely transformed. It is no longer a location, but an activity. This new era of hybrid work means a new generation of never-before-seen threats. Is your network ready? To succeed in this new world, we need to reimagine our infrastructure to support the flexibility demanded by the modern workforce - without compromising security or user experience. ZTNA 2.0 provides you a critical first step in accomplishing a...
September 13-14, 2022
Organizer: Palo Alto Networks | Prisma SASE
Location: Virtual
Add Favorite
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
Taking Zero Trust to the Next Level of...
Cyber threats to federal agencies continue to evolve, requiring equal agility in defending against them. To address the scope of the risk, the White House released Executive Order (EO) 14028 on improving the nation’s cybersecurity in May 2021. It outlined security best practices, including how the federal government must advance toward a zero trust architecture to keep pace with today’s dynamic and increasingly complex cyber threat...
September 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Meeting Mandates with Identity-Driven Z...
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a zero trust architecture strategy. The purpose of the mandate is to defend against sophisticated penetrations by adversaries, whether nation-states or criminals, and it emphasized that identity management and access controls are key components. Taken together, identity and access controls mean that privileged access...
September 1, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
GovForward ICAM Workshop
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies are working to consolidate and update their identity systems to protect a broad range of access by individuals and device...
August 17, 2022
Organizer: FCW | Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Meeting Federal Zero Trust Standards wi...
In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. To meet this changing security landscape, federal agencies and the defense industrial base mus...
August 17, 2022
Organizer: AvePoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Detect Financial Fraud with Data Scienc...
Amid the rise of financial fraud in the post-pandemic world, organizations need secure, scalable, and robust methods to mitigate risks. Using SAIC's Tenjin Artificial Intelligence (AI) Platform, the highly secure Koverse Data Platform, and Tableau, stakeholders can quickly and easily gain more accurate and informative insights from complex and disparate data sources. This use case will identify predictors of fraudulent transactions, which can...
August 16, 2022
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
ATARC 2022 Zero Trust Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as agencies aim to implement Zero Trust Security. Throughout the adoption and integration of Zero Trust principles into any cybersecurity strategy comes with many challenges and questions. Tune into this panel to hear from topic experts on the importance of emerging technologies while agencies are in the process of adopting and implementing Zero Trust Principles.
August 9, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Ensure End-to-End Security with a Digit...
How a Digital Twin Helps Extend Zero-Trust Initiatives Throughout the Multi-Cloud Environment Protecting federal IT systems is harder than ever. As threats continue to escalate and the transition to hybrid and multi-cloud environments accelerates, the boundaries are blurring, making it difficult to visualize and monitor systems as a whole. Federal agencies need to rapidly visualize security postures and verify compliance with the agency...
August 4, 2022
Organizer: Forward Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
The Future of Zero Trust Access & XDR
Join Trellix, DynTek & Carahsoft for a panel discussion on August 4, as we discuss: Evolving changes in cyber liability insurance in the midst of rising attacks and claims Moving beyond the basics - mapping the core 12 security controls to optimized investments that reduce your financial liability Addressing the cyber skills gap Maximizing cybersecurity visibility, operations, and response
August 4, 2022
Organizer: Trellix Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search