CTO Sessions: Thales TCT + Imperva: Tru...
Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protect valuable data. Enter data-centric security, which offers CISOs transformative opportunities to fortify data protection, compliance adherence and operational efficiency. Yet, ensuring robust defense mechanisms remains imperative, given the diverse pathways to data each with its own unique securi...
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe substa...
Lunch Bytes Webinar Series
Instead of settling for a regular break, participants joined Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Participants upgraded their lunch time with Public Sector Solutions Engineer, Matt Gardner, as he shared tactical insights and practical use cases on the following topics across four 30-minute sessions.
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. This webinar explored the intricate and powerful combination of Zero Trust and insider risk management! During the session, our speakers:Identified challenges and solution...
Fortress in the Cloud: Building Zero Trust
In today's increasingly complex cloud landscape, securing your environment requires a fundamental shift from traditional castle-and- moat defenses to a zero trust approach. This webinar, co-hosted by Palo Alto Networks and AWS, guided attendees through the essential concepts of zero trust security and explored how Palo Alto Networks and AWS can empower the attendees to achieve it.During this webinar, attendees:Understood the core principles of...
5 Easy Wins to Achieving Zero Trust in...
Orca Security, in collaboration with GuidePoint Security hosted this insightful webinar on June 18, 2024. Attendees listened in as Neil Carpenter, Elizabeth Sims and Chris Romero delved into the challenges and solutions for achieving Zero Trust in the cloud. Hear insights revolving across the key pillars:DataAutomation and OrchestrationGovernanceIdentities and EntitlementsApplication and Workload
Unlock the Power of AI for Government:...
This webinar explored how APIs streamline AI adoption, foster data-driven decision-making, and align with Zero Trust Architecture (ZTA) principles, ensuring secure and reliable AI-powered solutions for government agencies. This webinar covered:APIs as the Building Blocks of AI: How APIs provide modular, reusable components that accelerate the development and deployment of AI applications, reducing time-to-value for government initiatives.Data...
Supercharge Your SOC Performance
Attendees joined CrowdStrike to explore the capabilities of Falcon LogScale, designed to give DoD and military branches extended visibility to detect and hunt for advanced adversaries. Not only does it meet the NSA’s guidelines for visibility and analytics under the Zero Trust framework, but it is also DoD IL5 authorized. This webinar, featured speakers Jeff Worthington, Rob Reynolds and Evan Emskamp showcasing how SOC analysts can store...
Is Your Department CJIS Compliant?
With the recent increase in cyber-attacks that involve the use of weak and compromised credentials, organizations must secure their environment and resources with a Zero Trust framework and phishing-resistant role-based access. According to the latest FBI mandate, all police departments are required to implement multi-factor authentication (MFA) to access Criminal Justice Information Services (CJIS) platforms by October 1st, 2024. During this...
OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.