Back to Search Begin New Search Save Search Auto-Notify
Decoding SaaS Security in DoD: Ensure a...
Join us to gather vital insights into the security and management of Software as a Service (SaaS) technologies within Department of Defense (DoD) cloud environments. Former Army CIO, retired Lt. Gen. Bruce Crawford, and Aquia’s president and co-founder, Chris Hughes, will dive into cloud adoption, emphasizing practical pointers to strengthen your ability to navigate the complexities of SaaS security and management within the broader clou...
February 20, 2024
Organizer: Axonius Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust Summit
Advances in AI-assisted technologies and the growing sophistication of international threat actors are increasing the stakes for federal agencies to implement new and more effective safeguards to protect the nation’s strategic data. Much of that effort revolves around the Biden administration’s Executive Orders on National Cybersecurity and related mandates coming due in 2024 to adopt zero-trust architectures across their enterpris...
February 15, 2024
Organizer: CyberScoop
Location: Washington, DC
Add Favorite
Zero Trust: Transforming Cybersecurity¬...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
February 15, 2024
Organizer: Defense Acquisition University
Location: Webcast
Add Favorite
Applying Zero Trust Architecture in Sta...
State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies’ IT systems and technical support staff. Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter ...
February 13, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberSmart 2024: Facing a Rapidly Chang...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance,...
February 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
The Identity Catalyst: Accelerating Zer...
A decade ago, the Continuous Diagnostics and Mitigation (CDM) Program put agencies on the right path with critical investments in identity and access automation, but technology hasn’t stood still. Today, the Federal Zero Trust Strategy aims to accelerate cyber maturity throughout the government and secure our nation’s future. At the same time, relentless innovation in Artificial Intelligence is changing the game for attackers and d...
February 8, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Exploring Software Risk Management for...
Securing sensitive data and critical systems is crucial. Software risk management and application security strategies identify and mitigate vulnerabilities, ensuring compliance with industry standards for enhanced public sector cybersecurity. Join Synopsys experts to understand how Application Security Posture Management (ASPM) and Software Risk Management (SRM) can help your organization more effectively comply with software security requirem...
February 8, 2024
Organizer: Synopsys Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking Zero Trust: Strategic Approac...
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy? Join moderator Jason Miller, and agency and industry leaders on Feb. 7 at 2 p.m. to gain insights into the critical aspects of Zero Trust Architecture and how it can help reshape and innovate your cybersecurity approach. Learning objectives: Modernizing security through zero trust Navigating the zero trust culture shift Applying automation in security
February 7, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Identity Based Access for Warfighter Cy...
Zero Trust is a cutting-edge cybersecurity method gaining ground, especially in defense and government agencies like the Defense Information Systems Agency (DISA). Adopting a Zero Trust model revolves around the continuous verification and monitoring of all devices and users trying to access any network, ensuring cyber resiliency and robust security measures for secrets management, encryption, access control and auditing in warfighter operatio...
February 6, 2024
Organizer: HashiCorp Government Team at Carahsoft
Location: Webcast
Add Favorite
Navigating the Complex Landscape of Mod...
The cat-and-mouse game between threat actors and cybersecurity professionals continued unabated in 2023, with new threats designed to avoid detection. Many of these threats are new takes on old ones, such as “leveling up” invoice fraud. And ransomware attacks are evolving; rather than encrypting victims’ data, they are straightforwardly stealing the information and extorting payment by threatening to post the info online or t...
January 31, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search