Back to Search Begin New Search Save Search Auto-Notify
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
Tech on Tap: F5 Future Proofing Your Ap...
APIs are the lifeblood of the internet today. Everything from booking flights to reading your daily newsfeeds is all made possible by the growth of data sharing using Application Programming Interfaces (APIs). With the growth of modern applications, developers often unintentionally leak sensitive datasets. The proliferation of APIs has marked them as a prime target for malicious actors and nation-states leaving the DoD and the War Fighter vuln...
Add Favorite
How U.S. Federal Agencies Can Apply TIC...
In this webinar speakers reviewed how US Federal agencies can apply Trusted Internet Connection (TIC) 3.0 to AWS workloads, as well as the AWS Year-End Savings (YES) Promotion for select AWS Services, available from June 8, 2023 to September 30, 2023. AWS subject matter experts discussed: What is the TIC initiative TIC 2.0 vs. TIC 3.0 differences TIC 3.0 controls How TIC 3.0 aligns with Zero Trust Applying TIC 3.0 framework to AWS workloads by...
Add Favorite
The New National Cybersecurity Strategy...
Attendees of this webinar joined OPSWAT for a discussion around the new National Cybersecurity Strategy, that builds upon previous efforts, such as Zero Trust, to bolster protections to secure America’s cyberspace and its digital ecosystem. The reliance on critical infrastructure makes those who manage it big targets for nation-state and ransomware attacks, as well as any members of the Defense Industrial Base that are managing the criti...
Add Favorite
Forcepoint Zero Trust Content Disarm ...
At this on-demand webinar, we discussed the following capabilities of Forcepoint in-depth: Defeating All Malware for emails coming into your environment by cleaning every file Integrating Directly with Microsoft 365 to remove malware prior to emails being sent from or delivered to the mailbox without costly tools that need to be updated like AV or Sandboxing Stopping Data Exfiltration with Forcepoint's anti-steganography capabilities built int...
Add Favorite
Mastering Identity Governance: Enhancin...
Many agencies struggle to keep up with recent Executive Orders, Digital Transformation, and Zero Trust Strategies when creating a cohesive platform. Identity is the first pillar of Zero Trust and waiting years to bring together a system that satisfies all your identity-based controls is not an option. UberEther provides the only FedRAMP High and DoD Impact Level 5 platform in a private tenant-managed SaaS environment that can be tailored to y...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
The Netskope Unpacking Webinar Series
Throughout the webinar series, attendees explored the use of applications and cloud services, remote access, unknown data movement, and hidden risks.
Add Favorite
Back to Search Begin New Search