Quantum-Safe & Zero Trust: What Every F...
Federal agencies are racing to modernize cybersecurity infrastructure — not only to prepare for the quantum threat, but also to meet evolving Zero Trust mandates. Join Arqit, Intel & GAI for an exclusive panel discussion on how quantum-safe technologies are enabling federal organizations to build resilient, Zero Trust-aligned environments today. Moderated by Harvey Morrison, CEO and Co-Founder of Marion Square, this discussion highli...
Efficiency in Action: Identity Security...
Federal agencies are under increasing pressure to modernize legacy systems, adopt Zero Trust architectures, and meet evolving compliance mandates — all while managing limited resources and complex user ecosystems. The key to navigating this landscape efficiently? An identity-first approach that simplifies operations, reduces risk, and accelerates modernization. Watch David Lee, Field CTO - known as The Identity Jedi - and Andrew Wheleche...
Securing the Future: PQC, Compliance ...
QuSecure and Carahsoft hosted a high-level webinar overviewing how they are helping Federal government agencies prepare for the future of cybersecurity with quantum-resilient solutions.Fill out the form to access the recording for Federal use cases and strategies to:Understand the latest advancements in PQC and securing federal systemsLearn how to achieve compliance with evolving cybersecurity mandatesExplore how PQC integrates with Zero Trust...
Cyber Protection and Access in Conteste...
CSOI Zero Trust Networking alignment redefines how secure access and protection are controlled over various communication channels across contested and diverse IT, OT and cloud environments. By shifting focus from securing the network perimeter and away from using end-user credentials as primary network authentication to policy-based access centered around cryptographic identities, CSOI delivers a powerful identity-based, non-kinetic advantage...
CimTrak Enabling Comply-2-Connect and C...
As federal agencies accelerate their Zero Trust adoption, ensuring system integrity and compliance with mandates like Zero Trust and Comply-to-Connect (C2C) is more critical than ever. During this webinar, experts from Zscaler and CimTrak explored how combining Zscaler’s cloud-native Zero Trust Exchange with CimTrak’s real-time integrity monitoring and configuration management capabilities creates a robust framework for visibility,...
Assume Compromise: Modern Deception Str...
Attendees joined us to learn how advanced threats, such as Salt Typhoon, remain undetected for months. Adversaries are leveraging generative AI to mount stealthy attacks that evade traditional security controls. Defenders need an ability to detect threats rapidly and prevent adversary propagation.During this webinar, attendees learned:How advanced threats are evading detectionWhat the implications are of the assume breach principle of Zero Tru...
Modernizing DoD Access Control: How Pin...
This session highlighted: Seamless identity orchestration across hybrid and disconnected environmentsCAC-based authentication and digital signature enforcement with EDI PI validationHow policy-based access controls align with Zero Trust and CMMC frameworksRapid onboarding of users, modifying user access, and de-provisioning when users leaveSecure identity management for third-party and non-human users at the edge
Enhancing SOC Analyst Capability Throug...
Cyber defense teams continue to face mounting challenges, from fragmented toolsets and limited visibility to an expanding attack surface that complicates Zero Trust adoption. These issues hinder mission assurance and expose security gaps across public sector environments. In this tech talk, attendees learned how ServiceNow Security Operations (SecOps) and Tanium work together to deliver cyber readiness, real-time visibility, and rapid threat r...
Future-Proofing Public Sector Security:...
Attendees joined Google Cloud Security for an essential three-part webinar series designed to help public sector and higher education teams move from a reactive to a resilient defense.This series provided a practical roadmap to:Proactively hunt threats using AI-powered SecOps and threat intelligence.Implement a Zero Trust framework by securing the browser as a critical control point.Master rapid incident response to minimize impact and ensure...
Zero Trust for Justice Systems: Stop Da...
Cyberattacks are increasingly targeting justice systems, threatening sensitive case records, legal documents and even the identities of witnesses and victims. Many organizations still rely on outdated perimeter defenses, leaving critical systems and individuals at risk. Zentera and Carahsoft were joined on September 30th at 2 PM EST for an in-depth session on how Zentera’s “Collaboration Chambers” deliver Zero Trust security...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.