Zero Trust Implementation
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed, time-consuming, and agency...
Zero Trust Solutions in 2023: Use Cases...
Zero Trust remains one of the main topics in the cybersecurity industry. But what is Zero Trust really about? The broad theme of Zero Trust is about reducing implicit trust throughout the enterprise. The goal is to take an organization from an old non-defensible architecture based on compliance, controls, and a static protection oriented mindset, to a defensible security architecture based on continuous dynamic threat informed defense, and ris...
Leadership Dinner with The Hon. John Sherman
Join 300+ IC and DoD colleagues on Tuesday, November 7 from 5:30 - 9:30 pm ET at the Hilton McLean Tysons Corner, for a Leadership Dinner with The Hon. John Sherman, CIO, Department of Defense. Following an opening networking reception, Mr. Sherman will deliver prepared remarks focused on the DoD's strategic outlook for digital modernization and cybersecurity. After dinner, he will sit-down with INSA Chairwoman Tish Long for a moderated Q...
(ISC)² Security Congress 2023
The 13th annual (ISC)² Security Congress 2023 will bring together cybersecurity professionals from around the world for industry-leading education, compelling keynotes, exclusive networking, inside-track career resources, exhibitor showcases and much more, delivered all under one roof at the stunning Gaylord Opryland resort. From expert advice to industry insights, hear from the profession’s most knowledgeable speakers and participa...
October 25-27, 2023
Organizer:
(ISC)² Location:
Nashville, TN
ZTNA 2.0: Understanding the Next Evolut...
Zero Trust Network Access (ZTNA) has transformed cybersecurity in recent years, allowing governments to provide access to vital applications from the office, home, field or anywhere else. But ZTNA is not enough. In today’s ongoing perimeter-less environment, state and local agencies must do more to ensure network security, safeguard government data and protect sensitive constituent information. ZTNA 2.0 is the next generation of access m...
Transform Ideas Into Innovation Faster
Listen, learn and be ready to lead Dell Technologies Forum is the premier tech conference for technology enthusiasts and business leaders looking to drive innovation and growth! Join us for an immersive experience that brings it all together - the emerging trends, cutting-edge technologies, dynamic speakers and concrete ways people like you are transforming organizations. You’ll get hands-on with the latest technology solutions, explore...
8th Counter-Insider Threat Symposium
The 8th Annual Counter-Insider Threat Symposium will bring together leaders and experts across government and industry to discuss the current insider threat environment, and the technologies and policies necessary to disrupt and dismantle those threats and safeguard sensitive information vital to maintain national security.
14th Annual Billington CyberSecurity Summit
Join Top Leaders from the Public and Private Sectors in Cybersecurity The 14th Annual Billington Cybersecurity Summit will take place September 5–8, 2023, at the Ronald Reagan Building and International Trade Center in Washington, DC. With the unique educational mission of convening the who's who in cybersecurity, this annual event brings together senior leadership from the U.S. government and our allied partners along with their industr...
Cybersecurity Workshop: Navigating the...
This workshop will cover advanced cyber defense techniques and tools, emerging technologies in identifying zero-day vulnerabilities, mission and system resilience and survivability, and much more. Please join fellow Cyber Test & Evaluation (T&E), Acquisition, and Operation professionals from the government, industry, and academia to share information, lessons learned and knowledge. Join us at the opening Session on Wen. August 30th for...
How to Use Zero Trust to Secure Workloa...
During the past decade, increasing numbers of organizations have transformed their applications to be cloud native, building workloads based on multicloud architecture. Connecting and securing these cloud workloads has not been effective for many reasons and today, there are many benefits to a converged workload communication architecture that unifies security and operations. SANS tested the new Zscaler Zero Trust platform for cloud workloads,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.