Are SLED Organizations Ready for Zero T...
Join Hypori, and Scoop Cyber for a live, in-person roundtable webcasted for remote attendees, where industry experts will share how SLED organizations are overcoming these challenges with a zero trust mobility strategy. This interactive session will explore practical solutions for:Ensuring Criminal Justice Information Services (CJIS) compliance and preserving the chain of evidenceMeeting Cybersecurity Maturity Model Certification (CMMC) requir...
Cloud Security Workshop: Mastering Zero...
Join us in Raleigh, NC, for an informative workshop focused on how organizations can secure their cloud environments by transitioning from traditional defenses to a modern Zero Trust approach. Co-hosted by Palo Alto Networks, Okta, and AWS, this session will provide valuable insights into implementing Zero Trust security in evolving cloud landscapes. Attendees will be able to: Understand the compliance requirements for government data storage...
How Does Your Cybersecurity Strategy Me...
Now that we’re firmly in 2025, it’s time to take stock of your agency’s cybersecurity initiatives for the year. Where are you headed, and do you have an adequate roadmap to meet your cybersecurity goals? There is hardly any room for error when it comes to your agency’s cybersecurity, and the first step is to be aware of the latest best practices around zero trust, identity management, and the current risk landscape. Joi...
January 22, 2025
Organizer:
GovLoop Location:
Webcast
Washington DC SASE Summit - A Federal E...
Networking, Security, and Zero Trust: A Federal Evolution Join us for a one-day event where we’ll explore the advantages of a unified network and security-as-a-service platform. Discover how to kickstart or elevate your agency’s journey toward meeting the unique demands of SASE and Zero Trust frameworks tailored for government needs. Gain insights into the power of Netskope One and learn how government agencies can unlock seamless...
January 15, 2025
Organizer:
Netskope Location:
Washington, DC
Future-Ready Workspaces: A Collaborativ...
Omnissa, ClearCube, and HP subject matter experts will discuss their solutions and how new trusted zero clients connecting to Omnissa Horizon can help you with implementing your Zero Trust Endpoint strategy. Join us as we explore topics including: The enhanced capabilities available with this new zero client technologyHow to secure endpoints integrate into and support Zero Trust architectureVDI and remote connection protocol options, including...
Cloud Native Application Security - Lif...
Agencies have invested heavily in migrating applications to the cloud and creating cloud-native applications to serve the public. Securing these applications has emerged as a primary objective, particularly in incorporating them into a zero trust architecture. Strengthening app security focuses on integrating security measures throughout the application lifecycle – from development to deployment – by using cloud-native technologies...
January 14, 2025
Organizer:
FedInsider Location:
Webcast
Zero Trust 101: Start Your Journey Here
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
January 8, 2025
Organizer:
Zscaler Location:
Webcast
Protect the Mission: Secure Supply Chain
In an era of increasing cybersecurity threats, federal healthcare agencies can't afford to leave their software supply chains vulnerable. Join us for a dynamic webinar that reveals how Red Hat OpenShift, Ansible, and Red Hat’s Secure Software Factory can help you stay ahead of threats and meet stringent compliance requirements, including NIST and FedRAMP. Learn how to adopt automation and a zero-trust architecture to mitigate risks, resp...
December 20, 2024
Organizer:
Red Hat Location:
Virtual
CyberThreats 2024: Combatting the Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. From cyber attacks on water and wastewater treatment systems to ransomware targeting hospitals and physicians’ practices, phishing attacks to straightforward fraud, state and local agencies, educational institutions, and tribal and territorial governments often find themselves...
December 19, 2024
Organizer:
FedInsider Location:
Webcast
CyberThreats 2024: Combatting The Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. The U.S. government is responsible for attending to our national interests, from federal safety nets such as environmental protection and Social Security to national defense and protection against hostile foreign actors, whether individuals, terrorist groups or nation-states. Hundred...
December 18, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.