Back to Search Begin New Search Save Search Auto-Notify
Ransomware Protection: Reducing the Imp...
There is no shortage of options to consider for improving your organization's security posture. As novel ransomware techniques continue to proliferate, choosing the most effective project to prioritize is critical. Choosing correctly means weighing the efficacy, effort, and cost to determine which has the highest value in buying down ransomware risk.Join us as Garrett Weber, Director of Solutions Engineering at Akamai (previously at Guardicore...
February 3, 2022
Organizer: Akamai Government Team at Carahsoft
Location: Webcast
Add Favorite
Assessing the State of the (IT) Union:...
On the evening of Jan. 20, 2022, President Biden will make his first State of the Union address – a good time to assess the condition of federal IT, particularly with regard to policy prescriptions that agencies must adopt, such as zero trust, to achieve greater cyber resilience. The foundation of the May 2021 Cybersecurity Executive Order is the directive for agencies to implement a zero trust architecture to strengthen their cyber defe...
January 25, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Part 1: Protecting Against Advanced Thr...
Join OPSWAT on January 20th at 2:00pm ET for part 1 of this exclusive webinar series. During this series, we will focus on utilizing next-generation sandbox technologies to build your zero trust strategy for both IT and OT environments. This webinar will feature guest speakers Bob Gourley, former CTO of the DIA, and Bob Flores, former CTO of the CIA. Gourley and Flores are frequently called upon to build improvement plans for large commercial...
January 20, 2022
Organizer: OPSWAT Government Team at Carahsoft
Location: Webcast
Add Favorite
Building a Flexible Framework for Imple...
It is easy to say, “Never trust – always verify.” It is much harder to put that philosophy into practice, even though zero trust is the foundation of the Cybersecurity Executive Order released in May. It is unprecedented for an EO to be so specific in its cybersecurity directives. Despite the EO, there is no single way to approach zero trust implementation. The National Security Agency released some guidance in February about...
December 16, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Dividing By Zero: How Advanced Concepts...
The concept of zero trust is the core of the Cybersecurity Executive Order released in May. While its directives and deadlines apply to all federal agencies, it offers a useful model for state, local, territorial and tribal governments and educational systems whose cybersecurity needs are just as great. It is easy to say, “Never trust – always verify.” It is much harder to put into practice. The National Security Agency relea...
December 9, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Strategies for DoD Compliance
For companies in the U.S. Defense Industrial Base, modern realities like a remote workforce or managing cloud services can feel at odds with security and compliance requirements. Adopting a zero-trust strategy in the cloud helps business leaders and IT administrators tasked with implementing DFARS requirements, managing ITAR compliance, or preparing for the changing CMMC program, to accelerate compliance timelines and lighten the burden of tec...
December 8, 2021
Organizer: Zscaler Government Team at Carahsoft
Location: Webcast
Add Favorite
Beyond Stovepipes: Video Distribution f...
Video Distribution Systems (VDS) are crucial for instant situational awareness in operation centers and command and control rooms, providing video, audio and data to those that need it to make important decisions. These legacy, purpose-built systems have remained unchanged for years, seemingly protected by physical barriers. However, technology and workflow requirements have evolved, enhancing functionality while also illuminating the risks th...
December 2, 2021
Organizer: AFCEA
Location: Webcast
Add Favorite
ICIT 2021 Fall Briefing -- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
November 23, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
ATARC Zero Trust Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as agencies aim to implement Zero Trust Security. Throughout the adoption and integration of Zero Trust principles into any cybersecurity strategy comes with many challenges and questions, agencies must turn to emerging technologies to help with the adoption and integration process of Zero Trust.
November 17-18, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Implications of New Zero Trust Guidance...
The release of Executive Order (EO) 14028 in May made it clear that identity and security professionals must prepare themselves for fundamental changes in how their programs operate. As we get to the end of 2021, we are getting further clarity on what those changes might look like. Most recently, this has come from new guidance drafted by the Office of Management and Budget (OMB) and Cybersecurity and Infrastructure Security Agency (CISA): a F...
November 17, 2021
Organizer: Ping Identity Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search