Dynamic Security: Central to Achieving...
In an era where remote access and edge computing have become common, the idea of a security perimeter is out of date and ineffective. This is part of the push to move government IT systems to a Zero Trust architecture – every user and every interaction must be verified every time. This also means that cybersecurity must be dynamic, able to respond instantly to threats and able to pivot as new risks emerge. To meet the need, security has...
December 12, 2024
Organizer:
FedInsider Location:
Webcast
Connect and Protect End User Computing
Join us for an engaging webinar that delves into the powerful collaboration between IGEL and Zscaler. Discover how the integration of IGEL OS with Zscaler Cloud Browser Isolation and Privileged Remote Access offers a secure, cost-effective, and agentless approach to productive end-user computing. Together, we enable seamless access to cloud applications for employees and contractors, as well as secure remote access to systems, with powerful da...
December 12, 2024
Organizer:
Zscaler Location:
Webcast
Zero Trust 101: Start Your Journey Here
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
December 11, 2024
Organizer:
Zscaler Location:
Webcast
Navigating DDIL, Tactical Edge and Data...
The U.S. Military, Department of Defense (DOD), U.S. Intelligence Community (IC) and select civilian agencies face a critical exposure challenge. Traditional VPNs and existing security protocols can no longer provide secure network communications in contested environments. So, what do you do when your special purpose tactical network communications are not effective or when you must operate through a ‘dirty internet’ connection? An...
December 10-11, 2024
Organizer:
Appgate Location:
Reston, VA
Gartner Identity & Access Management Summit
Identity management is not just a critical component of cybersecurity; it is the cornerstone of enterprise resilience and agility. Gartner Identity and Access Management Summit 2024 is the premier conference to help IAM and security leaders tasked with safeguarding digital identity, business enablement and organizational security navigate implementing and operating a scalable IAM infrastructure. As you steer your organization through an evolvi...
December 9-11, 2024
Organizer:
Gartner Location:
Grapevine, TX
Enterprise IoT Hands-on Workshop
Did you know that 30% of connected devices on an enterprise network are IoT devices that are unseen, unmanaged and unprotected? What if you could discover 90% of your devices in 48 hours while paving the way for comprehensive Zero Trust?Join Palo Alto Networks for an interactive hands-on workshop and learn how you can eliminate implicit trust and enforce least privilege access with continuous verification and inspection capabilities. Sign up f...
Harnessing Automation to Reach Zero Tru...
All federal agencies are working to meet the Office of Management and Budget mandate to establish a zero trust architecture for their systems – a key element in improving cybersecurity across agencies. The National Security Agency (NSA) has laid out the seven pillars of Zero Trust: User, Device, Network & Environment, Application & Workload, Data, Automation & Orchestration, and Visibility & Analytics. In July the agency...
December 9, 2024
Organizer:
FedInsider Location:
Webcast
Mastering Zero Trust: Leveraging Networ...
In the rapidly evolving cybersecurity landscape, Zero Trust (ZT) adoption is more than a buzzword; it’s a mandate for federal agencies and a necessity for any organization striving to safeguard sensitive data and ensure secure operations. No matter where an organization is on its Zero Trust journey, one simple capability can help reach its goals faster: network visibility. In this webinar, we will explore key insights from industry leade...
December 5, 2024
Organizer:
ATARC Location:
Webcast
Ask the CIO: Defense Commissary Agency
Join host Jason Miller and agency and industry experts for a special webinar edition of Ask the CIO where they will explore strategies for implementing zero trust, protecting IT and operational technology, and addressing workforce challenges. Our guests will also share insights on how agencies are securing their supply chains and leveraging automation to strengthen defenses. Key topics include:Strategies for implementing zero trust principles...
Federal Executive Forum Zero Trust Stra...
How far have agencies progressed in their zero trust journey, and how have strategies adapted to address emerging security challenges? Join this webinar to hear valuable insights from leading federal and industry cybersecurity experts.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.