Back to Search Begin New Search Save Search Auto-Notify
Executive Orders, Memos and Mandates, Oh My!
The Biden Executive Order 14028, released May of 2021, required that CISA and OMB expand on the White House's new cybersecurity requirements. Over the last several months, CISA and OMB issued additional requirements and timelines to memos and reference architectures consistent with the Executive Order that Federal Agencies must meet to support the mission of Improving the Nation's Cybersecurity. Join GuidePoint Security on Thursday, February 1...
February 10, 2022
Organizer: GuidePoint Security LLC
Location: Webcast
Add Favorite
Extended Detection and Response: The Sw...
If you had to choose between a standard utility knife and a Swiss Army knife, which one would you pick? Most people would choose the latter because it can do more. Likewise, extended detection and response (XDR) offers the same capabilities as endpoint detection and response (EDR), plus so much more. XDR doesn’t stop at the endpoint. It provides a holistic view across networks, cloud workloads, servers, endpoints and more. This visibilit...
February 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Three Keys to Fulfill New Cybersecurity...
Join AWS, Wickr, Presidio Federal and Carahsoft to explore how together we can help your agency meet fulfill these requirements with ease – from creating a plan to accelerate cloud adoption, building architectures with a zero-trust security model, and increasing your overall environments visibility for security and compliance purposes. You will walk away with invaluable knowledge on how to: Adopt easy to use, secure multi-factor authoriz...
February 3, 2022
Organizer: AWS Government Team at Carahsoft
Location: Webcast
Add Favorite
Ransomware Protection: Reducing the Imp...
There is no shortage of options to consider for improving your organization's security posture. As novel ransomware techniques continue to proliferate, choosing the most effective project to prioritize is critical. Choosing correctly means weighing the efficacy, effort, and cost to determine which has the highest value in buying down ransomware risk.Join us as Garrett Weber, Director of Solutions Engineering at Akamai (previously at Guardicore...
February 3, 2022
Organizer: Akamai Government Team at Carahsoft
Location: Webcast
Add Favorite
Assessing the State of the (IT) Union:...
On the evening of Jan. 20, 2022, President Biden will make his first State of the Union address – a good time to assess the condition of federal IT, particularly with regard to policy prescriptions that agencies must adopt, such as zero trust, to achieve greater cyber resilience. The foundation of the May 2021 Cybersecurity Executive Order is the directive for agencies to implement a zero trust architecture to strengthen their cyber defe...
January 25, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Part 1: Protecting Against Advanced Thr...
Join OPSWAT on January 20th at 2:00pm ET for part 1 of this exclusive webinar series. During this series, we will focus on utilizing next-generation sandbox technologies to build your zero trust strategy for both IT and OT environments. This webinar will feature guest speakers Bob Gourley, former CTO of the DIA, and Bob Flores, former CTO of the CIA. Gourley and Flores are frequently called upon to build improvement plans for large commercial...
January 20, 2022
Organizer: OPSWAT Government Team at Carahsoft
Location: Webcast
Add Favorite
Building a Flexible Framework for Imple...
It is easy to say, “Never trust – always verify.” It is much harder to put that philosophy into practice, even though zero trust is the foundation of the Cybersecurity Executive Order released in May. It is unprecedented for an EO to be so specific in its cybersecurity directives. Despite the EO, there is no single way to approach zero trust implementation. The National Security Agency released some guidance in February about...
December 16, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Dividing By Zero: How Advanced Concepts...
The concept of zero trust is the core of the Cybersecurity Executive Order released in May. While its directives and deadlines apply to all federal agencies, it offers a useful model for state, local, territorial and tribal governments and educational systems whose cybersecurity needs are just as great. It is easy to say, “Never trust – always verify.” It is much harder to put into practice. The National Security Agency relea...
December 9, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Strategies for DoD Compliance
For companies in the U.S. Defense Industrial Base, modern realities like a remote workforce or managing cloud services can feel at odds with security and compliance requirements. Adopting a zero-trust strategy in the cloud helps business leaders and IT administrators tasked with implementing DFARS requirements, managing ITAR compliance, or preparing for the changing CMMC program, to accelerate compliance timelines and lighten the burden of tec...
December 8, 2021
Organizer: Zscaler Government Team at Carahsoft
Location: Webcast
Add Favorite
Beyond Stovepipes: Video Distribution f...
Video Distribution Systems (VDS) are crucial for instant situational awareness in operation centers and command and control rooms, providing video, audio and data to those that need it to make important decisions. These legacy, purpose-built systems have remained unchanged for years, seemingly protected by physical barriers. However, technology and workflow requirements have evolved, enhancing functionality while also illuminating the risks th...
December 2, 2021
Organizer: AFCEA
Location: Webcast
Add Favorite
Back to Search Begin New Search