Back to Search Begin New Search Save Search Auto-Notify
Next Generation Authentication is Coming
The Biden administration's recent Executive Order on Improving the Nation's Cybersecurity in 2021 has a provision to implement Zero Trust architecture across the federal agencies. Zero Trust was already gaining momentum before this Executive Order, but now it is accelerating. Secure authentication is one critical component of this strategy. Current authentication approaches are badly broken - passwords are longer, more complex, harder to remem...
Add Favorite
It's All About the Brand: Keeping Your...
In the 3rd quarter of 2021, the healthcare industry hit an unfortunate milestone of recording at least one ransomware attack against a healthcare facility every single day. The healthcare sector's widespread use of legacy devices and massive amounts of stored Protected Healthcare Information (PHI), makes the industry an environment ripe for threat actors. As the industry emerges from the shadow of the COVID-19 global pandemic, healthcare and p...
Add Favorite
The Road to Zero Trust Architecture: 5...
Join Experts from CISA, State Department and Mandiant as they share the steps to implement Zero Trust Architecture to comply with the cyber security Executive Order. The cyber security Executive Order, driven by the escalation of zero-day attacks from Solar Winds to Colonial Pipeline to Microsoft, aims to modernize U.S. government security defenses. This is a turning point for federal agencies, providing clear guidance toward ensuring that gov...
Add Favorite
Enabling Remote Government Access ...
Previously an occasional event, the COVID-19 pandemic makes remote work the new normal and government agencies are evolving how and where employees will work. As agencies evaluate how to work effectively, certain roles are moving to permanent remote work while a hybrid strategy is deployed to others. This new way of working opens organizations to new talent as well as new security challenges. This webinar teaches your agency how to securely en...
Add Favorite
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Add Favorite
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
Add Favorite
A Cybersecurity Playbook on Maximizing...
In this webinar, featured speakers Fernando Maymi, Dr. Michael Ehrlich, and Maria Thompson will give public sector stakeholders a playbook on securing cloud environments, enabling anonymous threat information-sharing across the public and private sectors, and ways to meet the objectives of the Biden EO on "Improving the Nation's Cybersecurity." You will also learn the importance of removing barriers to sharing threat information and developing...
Add Favorite
Zscaler One-Click for Zoom
In the age of unprecedented cyber attacks and unpredictable times, constituents in the modern world require flexibility and stability. Many agencies and organizations are continuing to shift enterprise communications to the cloud. Zoom offers world-class functionality, enabling workers to communicate and collaborate from anywhere. However, employees working from home need protection from cyber threats. With Zscaler One-Click for Zoom, agencies...
Add Favorite
Cybersmart TV: Zero Trust as a Federal...
Adopting a zero trust architecture is certainly not a new concept but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyber threats, a permanently expanded perimeter defining the next normal, and increased support from the current administration to prioritize its advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s att...
Add Favorite
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Add Favorite
Back to Search Begin New Search