5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way.Attendees joined CyberArk and Optiv + ClearShark's leaders on December 5th as they shared insights and "confessions" into implementing Zero Trust security principles, emphasizing that it’s...
2025 Government Predictions: Cyber Mand...
With calendar 2024 coming to a close, it’s a natural time to reflect on the cybersecurity mandates, policies and strategies that have shaped the last few years in government. One of the most impactful strategies has been Zero Trust. As agencies continue to implement zero trust security controls to reduce the attack surface, addressing foundational challenges like data protection, legacy technology and organization collaboration will be k...
Zero Trust for Federal Success: A Syste...
Right now, Civilian, Defense and National Security agencies are focusing on zero-trust pillars. The public sector is undertaking foundational shifts in the approach to cyber and capability delivery that keep critical data, assets and infrastructure safe. Join us to discover how leading Systems Integrators are capitalizing on federal zero trust mandates while delivering mission-critical solutions. Attendees learned how to:Select the right ZTN p...
F5's Approach to Zero Trust
Attendees joined for an exclusive webinar where F5’s Director of Solution Engineering, Corey Marshall, discussed how F5 approaches Zero Trust within the DoD and how enhancing API security is critical.During this webinar, the following topics were discussed:F5's Approach to Zero TrustUser: Access controls, identity management, focusing on BIG-IP’s security and API Gateway for secure accessDevice: Device security and verification thr...
The Hidden Dangers of Legacy PAM: Why Y...
Attendees joined Keeper Security on January 14th to explore how government organizations can navigate the complex, ever-expanding threat landscape and overcome challenges introduced by remote work and multi-cloud environments. Keeper explained how to gain practical strategies to protect both human and machine infrastructures effectively with a zero-trust approach. During this webinar, attendees were able to learn about:How to address the zero...
Fortifying State and Local Defenses: Na...
Ransomware attacks are becoming alarmingly frequent and sophisticated, posing severe risks to state and local government by compromising data, disrupting critical services, and imposing substantial financial burdens. Government was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 48% increase year-over-year in the number of attacks according to data from the Zscaler ThreatLabz 2024 Ransomware Report. Understanding t...
Strengthening Defenses: Counter Nation-...
Watch the on-demand webinar with Dragos and Xage Security, where we explored defending against sophisticated nation-state threats to critical infrastructure, including Volt Typhoon. Attendees discovered different strategies for detecting and countering advanced cyber adversaries in OT and IT-OT environments. We covered real-time threat detection, incident response, Zero Trust security and unified defense strategies, combining Dragos' threat in...
Unlocking the Power of Symantec SASE fo...
This webinar discussed how Symantec Secure Access Service Edge (SASE) can transform your security strategy, providing seamless protection across all your end-points, users, and applications. Key topics discussed during the webinar include:The evolution of SASE and its role in securing workforcesHow Symantec SASE integrates with existing infrastructures to ensre scalability and flexibiltyDeep dive into Symantec's cloud-delivered security servic...
Securing the Identity Plane: Enhancing...
As the Department of Defense (DoD) continues its effort towards its zero trust objectives, identity is quickly recognized as the critical foundation to which all of the pillars depend. Unfortunately, identity based attacks are on the rise and present a unique and continued risk to the DoD enterprise. Explore the complexities of the numerous identity planes in an environment and how the native capabilities and integrations between CrowdStrike a...
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.