Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
ISC2 SECURE Washington, DC 2025 On-Demand
If you were unable to join us in person, now you can experience the highlights anywhere, anytime. Our ISC2 SECURE Washington, DC 2025 On-Demand curated bundle gives you instant access to leading voices, expert insights and actionable strategies that will help you navigate today’s evolving cyber landscape. Catch up on what you missed and earn up to 6.75 CPE credits.
Zero Trust in Action: Securing Identity...
In today’s hybrid, cloud-first world, identity and data have became the new security perimeter. Applying a Zero Trust model was essential to protecting these assets and ensuring operational resilience. This on-demand webinar featured Microsoft experts sharing practical strategies for implementing Zero Trust using Microsoft Entra ID and Microsoft Purview. During the webinar, attendees:Prevent unauthorized access and protect user identitie...
Mission FedRAMP High: Fast-Tracking Zer...
Federal agencies face unprecedented cybersecurity challenges driven by evolving threats, compliance pressures, and budget constraints. Agencies shouldn’t have to juggle extra solutions, contracts, or overhead just to comply with EO 14028, OMB M-22-09, and the DoD Zero-Trust Strategy. To navigate these complexities, agencies are turning to integrated solutions that streamline Privileged Access Management (PAM) and elevate compliance to Fe...
Defending Identity and Securing Mission...
Phishing-resistant access is now a mandate, not a nice-to-have. But most Federal authentication workflows still rely on passwords or other shared secrets that attackers can easily exploit. These compromises often become the entry point for lateral movement inside networks, escalating the impact of a breach. During this webinar, attendees learned how Beyond Identity helps agencies strengthen both device and identity assurance without introducin...
Operationalizing Quantum-Ready Zero Tru...
US Federal agencies are facing a dual challenge: the urgent need to adopt Zero Trust while simultaneously preparing for quantum-safe future. Executive orders like EO 14306 and EO 14028 are putting the pressure on, requiring rapid PQC and ZT adoption. How can agencies effectively bridge the gap between these two critical initiatives and successfully meet the executive mandates? The answer lies in Cryptographic Posture Management. Carahsoft, Mar...
Restoring Trust in Every Digital Interaction
During this webinar, we explored how to detect and prevent threats like synthetic identities, account takeovers and impersonation.Attendees were able to:Understand today’s evolving identity fraud landscape and its impact on public trustLearn how to integrate fraud detection, identity verification and adaptive authenticationDiscover best practices for reducing friction for employees and constituents alikeSee how Ping Identity helps state...
Transforming Defense Cybersecurity: Ins...
This webinar brings together Bob Skinner, USAF retired former Director of the Defense Information Systems Agency (DISA) and Commander of the Joint Force Headquarters Department of Defense Information Network and Keith Johnson, Director of Defense Solutions at AWS. Together, they will discuss the Zscaler Trusted Access Gateway (ZTAG) and its role in revolutionizing cyber security within defense environments. Highlights will include how Zscaler...
Full Throttle, Firm Control: Build Your...
State and local leaders are under pressure to deliver modern services, fast—and agentic AI looks like the accelerant. But autonomy introduces new risks you’re not staffed or tooled to absorb: emergent behaviors, goal hijacking, privilege sprawl and cascading failures that evade traditional controls. This session introduced Forrester’s AEGIS (Agentic AI Enterprise Guardrails for Information Security) framework, a practical blu...
Unlock the Potential of PeopleSoft with...
In this webinar, attendees learned:How Pathlock Cloud Analytics can dramatically improve PeopleSoft operational efficiencyBenefits of new enhancements including incorporation of AI search and analysis as well as multi-tenant visibilityHow Pathlock Cloud Analytics supports Zero Trust initiatives though better visibility and actionable insights
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.