Back to Search Begin New Search Save Search Auto-Notify
The Journey to Zero Trust
Zero Trust can be a confusing concept for many organizations, especially for those that are at an early stage of its adoption. Zero Trust solutions protect networks, applications, and data based on the concept of "never trust, always verify." In a Zero Trust environment, identity is the core security control used by security teams that "assume breach" because any user or device is a potential threat actor. Join us on October 14th for a live we...
October 14, 2021
Organizer: Cybersecurity Government Team at Carahsoft
Location: Webcast
Add Favorite
Advancing Security Within The Federal G...
As new technologies are being implemented and deployed throughout the Federal Government, agencies are having to take a step back and ensure their systems are secure. Tune into this panel to hear from topic experts on best practices to enable enterprises to adopt new connected devices without fear of compromise by cyber-attack. Zero Trust security is a framework of policies, technologies, and systems that are applied to users and devices. Hear...
October 14, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Security Virtual Conference: Ransomware
Ransomware is a form of malware designed to encrypt data files rendering any files on the computing device unusable. Once files are encrypted a ransom is demanded in exchange for decryption keys. Ransomware is a major ongoing security problem and a growing national security threat. Government agencies are organizing on numerous fronts to combat ransomware. On July 15, 2021 the U.S. Government launched a new One-Stop Ransomware resource at stop...
October 7, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Building Cyber Resilience with Zero Tru...
Zero Trust Data Management is more than the latest buzzword. With the new Executive Order on Improving the Nation’s Cybersecurity, coupled with Federal agencies creating data at breakneck speeds and an unprecedented growth in ransomware attacks – their need to better understand, easily share and protect their data by staying ahead of cyber adversaries is a top priority for Federal leaders. Add to that, traditional IT security defen...
September 30, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Hear From the Authors: Federal Zero Tru...
Among other Federal Government initiatives, the Executive Order 14028 of May 2021, “Improving the Nation’s Cybersecurity” triggered the creation of three documents, critical to helping agencies to adopt zero trust cybersecurity principles and adjust their network architectures accordingly. The Office of Management and Budget (OMB) has released a draft Federal Zero Trust Strategy, to adapt and accelerate civilian agencies...
September 23, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Moving Federal Agencies Toward Zero Trust
The recent cybersecurity Executive Order emphasizes the need for more structure and to start moving toward a Zero Trust architecture. This architecture is a broad strategy that follows the mantra, "Never trust, always verify," and assumes untrusted actors already exist both inside and outside agency networks. By moving federal agencies toward Zero Trust, their resources can stay protected through an architecture that adapts to the complexity o...
September 15, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Stealthbits Solar Winds Webinar
Ransomware attacks have increased 300% in the first half of 2021. Forrester estimates that 80% of security breaches involve privileged credentials! Zero Trust is a security concept incorporating a variety of solutions that have to work together in an integrated fashion. Join Stealthbits on September 9th, for a webinar on enabling Zero Trust. Stealthbits provides solutions for Data Access Governance, Active Directory Management & Security,...
September 9, 2021
Organizer: Stealthbits Government Team at Carahsoft
Location: Webcast
Add Favorite
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Bringing Zero Trust Cybersecurity to th...
The White House Executive Order issued in May directs federal agencies to, through bold changes and significant investments, apply zero trust practices to strengthen cybersecurity across government and the private sector. The EO sets objectives and timeframes but does not guide the strategies to achieve those outcomes. Unlike many EOs, however, the administration is allocating funding to help agencies undertake the work – from the edge a...
August 26, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Zero Trust Architecture - What You Shou...
While the concept of Zero Trust has been around for some time, the publication of NIST SP 800-207 (Zero Trust Architecture) has provided clarity, definition, and a recommended approach to a Zero Trust Architecture. President Biden's May 12th Executive Order has created a policy for Federal Agencies to adopt a Zero Trust Architecture, which will likely impact State and Local Government agencies, service providers, supply chains, and private ent...
July 28, 2021
Organizer: Certes Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search