Digital Forensics for National Security...
Defense Strategies Institute is proud to announce the 5th Annual Digital Forensics for National Security Symposium on May 15-16th, 2024. The Digital Forensics Symposium will bring together IC, DoD, federal government, industry, and academia in a town hall style forum to collaborate across the community on ways to advance digital forensics solutions to support criminal investigations, crime prevention, and threat mitigation efforts.The symposiu...
How Do You Know Where to Start Your Zer...
Do you have all the parts of zero trust in place to control risk to your crown jewels? If you don't know where to start, you probably need to assess your situation. Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust j...
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
Lunch Bytes Webinar Series
Don't settle for a regular break. Join Dynatrace online for Lunch Bytes, a snackable series of easily digestible events covering today's leading technology topics. Upgrade your lunch time with Solutions Engineer, Matt Gardner, as he shares tactical insights and practical use cases across the following four 30-minute sessions.
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer:
ATARC Location:
Webcast
Enterprise Education Series: Pillars of...
Mark your calendar and join us for the next installment of our Enterprise Education Series! The topic will be the Pillars of Zero Trust, and attendees will receive 1 CLP for attending. The Enterprise Education Series is designed to: Expand your awareness of innovative contract solutions Help you drive transformative outcomes Provide you with direct points of contact for support and additional education Our upcoming event is a solutions-focused...
Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration, co-hosted by IBM and Palo Alto Networks. Meeting NIST 800-207 Guidelines – a demonstration of cutting edge zero trust-oriented software tools that enable and empower US Federal SOC operations to gain new efficiencies. Please note this is a hybrid demonstration. Government attendees may join virtually or in-person at the IBM Innovation Studio located at 600 14th St NW, Suite 200, Washin...
April 26, 2024
Organizer:
ATARC Location:
Washington, DC
Securing Success: RMF and Zero Trust Un...
Our digital world is more expansive than ever before, giving access to unprecedented capabilities for our business, government, and personal use. As digital transformation accelerates, the risks associated with cyberattacks grow and affect every aspect of modern business, from customer service to government operations to smart infrastructure. Cyber or Business resilience must be a critical component of all security strategies — yet it is...
April 25, 2024
Organizer:
ATARC Location:
Webcast
Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.