Finding Zero Trust to Alternatives to R...
Are aging VPNs still relevant in your long-term network strategy? VPNs are plagued by vulnerabilities and regularly exploited by attackers. Their network-centric design backhauls traffic and allows for lateral movement by putting users directly on the network. During this webinar, a panel of experts discussed the challenges of connecting employees and third parties to private applications using traditional VPNs, explored why fully remote and h...
Revolutionizing Cybersecurity for Feder...
Government agencies handle an extensive amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. Isolated cloud environments, known as GovClouds, help these US government agencies, contractors, and other organizations meet their regulatory and compliance requirements when running sensitive workloads in the cloud. Zscaler is a long-time partner with the government to secure IT moderni...
Empowering the U.S. Army's Hybrid Workf...
Palo Alto Networks Prisma Access IL5 protects hybrid workforces with superior security, while providing exceptional user experiences from a simple, unified security product. Purpose-built for cloud-enabled DoD agencies, Prisma Access IL5 consolidates multiple point products into a single integrated service, reducing complexity while increasing organizational agility. With a common policy framework, consistent visibility, single-pane-of-glass m...
Achieving Zero Trust with Kiteworks ...
In this webinar, attendees explored:How to leverage Kiteworks & Proofpoint to consolidate and control third-party communications across email, file sharing, MFT, SFTP, web forms, chat, collaboration spaces, or via APIs.Strategies for achieving content-defined zero trust to comply with federal and central government mandates like Executive Order (EO) 14028.Methods for demonstrating compliance with industry regulations and international stan...
Anatomy of a Ransomware Attack: Protect...
Ransomware attacks are becoming alarmingly frequent and sophisticated. They pose severe risks to healthcare providers by compromising patient data, disrupting critical services, and imposing substantial financial burdens. According to data from the Zscaler ThreatLabz 2024 Ransomware Report, healthcare was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 126% increase year-over-year in the number of attacks.Understan...
From the Frontlines: Lessons learned fr...
Deploying Zero Trust for an Operational Technology network differs from deploying it on an IT network. Dragos and BlastWave have learned hard lessons with customers on the best practices for deploying OT Zero Trust in the real world and shared these lessons with attendees. They also explored how the pillars of the multiple OT cybersecurity frameworks (NIST, DoD, NIS2, etc.) are combined to provide a deployable solution for critical OT networks...
Outpacing the Digital Threat with Endpo...
Attendees of this webinar gained insight on Ivanti's Endpoint and Patch Management strategies. Key discussion points included:DISA Enterprise Patch Management System overviewManage any device and use cases (Windows, Linux, MacOS, ChromeOS, Android, and iOS)Outpacing strategies for the increase of Information Assurance Vulnerability alerts and CVEs
Gain Full Visibility and Meet Zero Trus...
Attacks on identities, especially privileged identities, are at an all-time high. Yet agencies are challenged with securing significantly more privileged accounts and supporting vastly larger decentralized networks than in years past. Organizations need a higher degree of privileged access protection. A zero-trust architecture (ZTA) addresses modern identity security challenges by enforcing granular, secure, authorized access. Tools like Beyon...
Overcoming Zero Trust Challenges in Fed...
As federal agencies advance toward implementing Zero Trust Architecture (ZTA), the path is often met with challenges ranging from managing access controls to ensuring continuous monitoring and policy enforcement. Attendees joined us to learn how ServiceNow offers a powerful, integrated platform designed to meet these needs, supporting agencies in achieving ZTA compliance and enhancing security resilience.Registrants learned how ServiceNow Secu...
Strengthening Cybersecurity in the Judiciary
As the digital transformation of the judiciary accelerates, courts are increasingly reliant on technology to administer justice efficiently and securely. However, this reliance brings heightened cybersecurity risks, necessitating robust defense mechanisms to protect sensitive data and maintain the integrity of judicial processes. Listen to experts from Zscaler and CrowdStrike in this comprehensive on-demand recording designed specifically for...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.