Back to Search Begin New Search Save Search Auto-Notify
Securing the Cyber/Software Supply Chain
Executive Order 14028 (Improving the Nation’s Cybersecurity) established new requirements to secure the federal government’s software supply chain. The requirements involved systematic reviews, process improvements, and security standards for both software suppliers and developers, in addition to customers who acquire software for the federal government. The software supply chain is only truly secure when all entities throughout t...
February 29, 2024
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Zero Trust World 2024
Learn from experts, learn from peers, and expand your network in a fun environment with three days designed to improve your knowledge and skills as an IT professional. Onsite you'll choose from a variety of sessions with topics to help you today and in the future. Cybersecurity sessions are CPE eligible. The daily schedule includes mornings in the Mainstage with keynotes and subject matter experts providing insight into threats and technology....
February 26-28, 2024
Organizer: ThreatLocker
Location: Orlando, FL
Add Favorite
Cybersecurity Summit 2024
Public sector organizations continue to face a constant barrage of sophisticated cyber threats. And with new cybersecurity mandates and guidance — from recent executive orders to the release of the 2023 National Cyber Strategy — public sector leaders must make considerable decisions about their cyber enterprise that will have lasting impacts for years to come. On top of this, the emergence of novel security capabilities built on ma...
February 27, 2024
Organizer: FEDSCOOP
Location: Washington, DC
Add Favorite
Rise of the Machines! Zero Trust Consid...
In today’s world, we’re constantly hearing about new tech terms and breakthroughs, from artificial intelligence (AI) to Zero Trust security. Government organizations are always trying to keep up, looking for quicker and smarter ways to get things done and keep their information safe. AI has been a big help, making tasks faster to complete than ever before. But, this progress comes with its own set of questions. What are the downsid...
February 22, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
NASA Splunking into Zero Trust
Join us to explore how Splunk can empower NASA's Zero Trust (ZT) initiative and strengthen its security framework. Splunk's cutting-edge technology seamlessly reinforces the "cross-cutting capabilities" outlined in CISA's Zero Trust Maturity Model, covering vital elements such as enhanced visibility and analytics, efficient automation and orchestration, and robust governance. Splunk efficiently integrates these technologies to offer a compreh...
February 20, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Decoding SaaS Security in DoD: Ensure a...
Join us to gather vital insights into the security and management of Software as a Service (SaaS) technologies within Department of Defense (DoD) cloud environments. Former Army CIO, retired Lt. Gen. Bruce Crawford, and Aquia’s president and co-founder, Chris Hughes, will dive into cloud adoption, emphasizing practical pointers to strengthen your ability to navigate the complexities of SaaS security and management within the broader clou...
February 20, 2024
Organizer: Axonius Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust Summit
Advances in AI-assisted technologies and the growing sophistication of international threat actors are increasing the stakes for federal agencies to implement new and more effective safeguards to protect the nation’s strategic data. Much of that effort revolves around the Biden administration’s Executive Orders on National Cybersecurity and related mandates coming due in 2024 to adopt zero-trust architectures across their enterpris...
February 15, 2024
Organizer: CyberScoop
Location: Washington, DC
Add Favorite
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
February 15, 2024
Organizer: Defense Acquisition University
Location: Webcast
Add Favorite
Applying Zero Trust Architecture in Sta...
State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies’ IT systems and technical support staff. Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter ...
February 13, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberSmart 2024: Facing a Rapidly Chang...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance,...
February 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search