Next Generation Authentication is Coming
The Biden administration's recent Executive Order on Improving the Nation's Cybersecurity in 2021 has a provision to implement Zero Trust architecture across the federal agencies. Zero Trust was already gaining momentum before this Executive Order, but now it is accelerating. Secure authentication is one critical component of this strategy. Current authentication approaches are badly broken - passwords are longer, more complex, harder to remem...
It's All About the Brand: Keeping Your...
In the 3rd quarter of 2021, the healthcare industry hit an unfortunate milestone of recording at least one ransomware attack against a healthcare facility every single day. The healthcare sector's widespread use of legacy devices and massive amounts of stored Protected Healthcare Information (PHI), makes the industry an environment ripe for threat actors. As the industry emerges from the shadow of the COVID-19 global pandemic, healthcare and p...
The Road to Zero Trust Architecture: 5...
Join Experts from CISA, State Department and Mandiant as they share the steps to implement Zero Trust Architecture to comply with the cyber security Executive Order. The cyber security Executive Order, driven by the escalation of zero-day attacks from Solar Winds to Colonial Pipeline to Microsoft, aims to modernize U.S. government security defenses. This is a turning point for federal agencies, providing clear guidance toward ensuring that gov...
Enabling Remote Government Access ...
Previously an occasional event, the COVID-19 pandemic makes remote work the new normal and government agencies are evolving how and where employees will work. As agencies evaluate how to work effectively, certain roles are moving to permanent remote work while a hybrid strategy is deployed to others. This new way of working opens organizations to new talent as well as new security challenges. This webinar teaches your agency how to securely en...
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
A Cybersecurity Playbook on Maximizing...
In this webinar, featured speakers Fernando Maymi, Dr. Michael Ehrlich, and Maria Thompson will give public sector stakeholders a playbook on securing cloud environments, enabling anonymous threat information-sharing across the public and private sectors, and ways to meet the objectives of the Biden EO on "Improving the Nation's Cybersecurity." You will also learn the importance of removing barriers to sharing threat information and developing...
Zscaler One-Click for Zoom
In the age of unprecedented cyber attacks and unpredictable times, constituents in the modern world require flexibility and stability. Many agencies and organizations are continuing to shift enterprise communications to the cloud. Zoom offers world-class functionality, enabling workers to communicate and collaborate from anywhere. However, employees working from home need protection from cyber threats. With Zscaler One-Click for Zoom, agencies...
Cybersmart TV: Zero Trust as a Federal...
Adopting a zero trust architecture is certainly not a new concept but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyber threats, a permanently expanded perimeter defining the next normal, and increased support from the current administration to prioritize its advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s att...
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.