CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
Fortifying The Expanding Role Of The Fe...
In the last five years, OMB and CISA have been expanding the role of Federal cybersecurity programs beyond traditional IT. As the threat has expanded deep into software supply chain, third-parties, IOT/OT and cryptography, understanding where to focus has become more difficult and resource intensive. The CISO and their staff constantly balance mission priorities with zero trust goals, audit findings and modernization efforts while continually...
Dashboarding at DOI: Visualize Mission-...
Participants joined us for a Dashboard Studio hands-on workshop with Brent Terry, our Splunk DOI Senior Solution Engineer. An included feature of the Splunk platform, Dashboard Studio allows you to customize dashboards in Splunk, such as designing your dashboard's layout, colors, images, and more. During this hands-on workshop, we went over:An introduction to Splunk Dashboard StudioHands-on experience creating a Splunk dashboard based on multi...
Qualys TotalCloud 2.0: Cloud Native App...
In accordance with White House Executive Order 14028, CISA published the Cloud Security Technical Reference Architecture in June 2022 to provide guidance to Agencies on secure cloud services adoption to enable the adoption of Zero Trust. Attendees joined us on August 15th for an insightful webinar where Qualys executives will discuss CISA’s 2022 guidance, the evolution of cloud security, and where the future of Cloud Security is headed....
The Role of Integrity Within Zero Trust
Attendees who joined this webinar learned about:Zero trust as it applies to federal agency cybersecurityThe role integrity plays in enforcing a zero trust approachMethods for achieving integrity using file integrity monitoring (FIM) and security configuration management (SCM)
Register Now: The Role of IAM in Zero Trust
Attendees joined Okta's Field CTO, Public Sector on August 21st for a webinar discussing The Role of IAM in Zero Trust. Zero Trust may be a buzzword for security leaders today, but there’s still a ton of relevancy in core Zero Trust principles. Okta discussed moving beyond the buzzword and repeated messages that fall short in providing a clear and concise path forward. For security practitioners who strongly advocate for Zero Trust, we...
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Extending Microsoft Collaboration ABAC...
The defense industrial base (DIB) must meet the critical controls laid out CMMC, NIST, DFARS and other government mandates to bid on defense contracts and protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Watch this on-demand webinar as we explore how extending a Zero Trust approach to file access and sharing using archTIS’s NC Protect helps to ensure compliance with various standards for secure ac...
Segmentation is the Foundation of Zero Trust
Illumio invites you to watch their webinar, Segementation is the Foundation of Zero Trust. Hear from the creator of Zero Trust, John Kindervag during this presentation. Attendees learned:John Kindervag's distinct perspective on cybersecurity, and his Zero Trust origin storyCA AB 740 and why Microsegmentation is key to a Zero Trust strategyWhat the future holds for Zero Trust Segmentation
Securing Your IoT Devices Across the Pu...
Attendees of this webinar were able to:Explore the importance of IoT security in the public sectorLearn about Zero Trust principles and their application to IoT ecosystemsDiscover how security solutions from Palo Alto Networks provide visibility, control and security for your digital assets
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.