Assessing the State of the (IT) Union:...
On the evening of Jan. 20, 2022, President Biden will make his first State of the Union address – a good time to assess the condition of federal IT, particularly with regard to policy prescriptions that agencies must adopt, such as zero trust, to achieve greater cyber resilience. The foundation of the May 2021 Cybersecurity Executive Order is the directive for agencies to implement a zero trust architecture to strengthen their cyber defe...
January 25, 2022
Organizer:
FEDINSIDER Location:
Webcast
Part 1: Protecting Against Advanced Thr...
Join OPSWAT on January 20th at 2:00pm ET for part 1 of this exclusive webinar series. During this series, we will focus on utilizing next-generation sandbox technologies to build your zero trust strategy for both IT and OT environments. This webinar will feature guest speakers Bob Gourley, former CTO of the DIA, and Bob Flores, former CTO of the CIA. Gourley and Flores are frequently called upon to build improvement plans for large commercial...
Building a Flexible Framework for Imple...
It is easy to say, “Never trust – always verify.” It is much harder to put that philosophy into practice, even though zero trust is the foundation of the Cybersecurity Executive Order released in May. It is unprecedented for an EO to be so specific in its cybersecurity directives. Despite the EO, there is no single way to approach zero trust implementation. The National Security Agency released some guidance in February about...
December 16, 2021
Organizer:
FEDINSIDER Location:
Webcast
Dividing By Zero: How Advanced Concepts...
The concept of zero trust is the core of the Cybersecurity Executive Order released in May. While its directives and deadlines apply to all federal agencies, it offers a useful model for state, local, territorial and tribal governments and educational systems whose cybersecurity needs are just as great. It is easy to say, “Never trust – always verify.” It is much harder to put into practice. The National Security Agency relea...
December 9, 2021
Organizer:
FEDINSIDER Location:
Webcast
Beyond Stovepipes: Video Distribution f...
Video Distribution Systems (VDS) are crucial for instant situational awareness in operation centers and command and control rooms, providing video, audio and data to those that need it to make important decisions. These legacy, purpose-built systems have remained unchanged for years, seemingly protected by physical barriers. However, technology and workflow requirements have evolved, enhancing functionality while also illuminating the risks th...
December 2, 2021
Organizer:
AFCEA Location:
Webcast
ICIT 2021 Fall Briefing -- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
ATARC Zero Trust Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as agencies aim to implement Zero Trust Security. Throughout the adoption and integration of Zero Trust principles into any cybersecurity strategy comes with many challenges and questions, agencies must turn to emerging technologies to help with the adoption and integration process of Zero Trust.
November 17-18, 2021
Organizer:
ATARC Location:
Webcast
Practical Approaches to Achieving Zero...
Government agencies will be operating in a hybrid workplace for the foreseeable future. Establishing secure connections between user endpoints and cloud resources through a zero trust approach is critical to ensuring the hybrid work environment remains sustainable. In this exclusive webinar, technology executives from the National Science Foundation, U.S. Environmental Protection Agency, National Oceanic and Atmospheric Administration and Look...
Cyber Leaders Focus on Zero Trust
Over the course of the last two years a few things have become clear about zero trust: It’s not a product. It’s not a capability. It’s a way of thinking and securing data, systems and people. In this exclusive webinar, technology executives from the Cybersecurity and Infrastructure Security Agency, Department of Health and Human Services, Fidelis Cybersecurity, Forcepoint and Forward Networks will elaborate on their zero trus...
A Government Guide to Zero Trust | Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.Address...
November 10, 2021
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.