Zero Trust Lab Phase 2 Demonstration wi...
Join our ATARC Zero Trust Lab Phase 2 Demonstration with Available Networks, Darktrace Federal, Walacor Corporation, and Technology Partners. Available Networks was created to build a national security grade private networking environment designed and integrated to meet the standards, methods and best practices defined by the Zero Trust Architectures from NIST, CISA and the U.S. Department of Defense. That solution, ZTNS, is currently being de...
September 13, 2024
Organizer:
ATARC Location:
Webcast
AWS Non-Profit Healthcare - Zero Trust...
Join us for the latest insights on securing your healthcare organization with a Zero Trust Framework. Mark your calendars and join us for our Zero Trust Roadshow. Attendees of this event can expect to learn more about specific Zero Trust strategies and solutions such as: Data Security strategies to encrypt data at rest and in transit. Endpoint protection measures to safeguard devices from malware, vulnerabilities, and unauthorized access. Iden...
How to Follow DoD Zero Trust Guidelines
Zero Trust .... But VerifyZero trust security is a necessity in modern cybersecurity frameworks, endorsed by comprehensive directives from the United States Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA). The DoD Zero Trust Strategy alongside the DoD Zero Trust Capability Execution Roadmap offers in-depth guidance designed to facilitate any organization's transition to a robust Zero Trust model. Joi...
Ask the CIO: Marine Corps Forces Cybers...
In this exclusive webinar edition of Ask the CIO, host Jason Miller and his guest, Shery Thomas, cyber technology officer and technical director of the Marine Corps Information Command, Marine Corps Forces Cyberspace Command and Marine Corps Forces Space Command will discuss cybersecurity efforts at the Marine Corps. In addition, Ted Wagner, vice president and chief information security officer at SAP NS2 and Frank Cundiff, senior customer sol...
Outpacing the Digital Threat with Endpo...
Join Ivanti and Carahsoft for a webinar to explore the critical role of strong Endpoint and Patch Management for the DoD and IC community. Ivanti offers practical insights and firsthand experiences from real-world deployments with government agencies. Discover best practices of security aligned with Zero Trust principles, strategies for implementing Cyber Asset Attack Surface Management (CAASM), how to manage and deploy modern endpoints, and o...
Zero Trust 101: Start Your Journey Here
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
September 4, 2024
Organizer:
Zscaler Location:
Webcast
Advancing Zero Trust Maturity with Dyna...
In today's rapidly evolving digital landscape, cybersecurity must be a top priority, especially in the public sector where applications and workloads face ever-increasing threats. Join Dynatrace and AWS online on August 27th as we delve into:The NSA's recommendations for maturing application and workload securityStrategies for integrating Zero Trust principles into cloud environments and workload managementHow AWS’s cloud services and Dy...
Workshop Identity Security
Identity is at the center of cybersecurity. With zero trust now the mandated de facto approach to strengthening cyber defenses, federal agencies need to build an identity-centric security approach encompassing both human and machine identities. This requires an enterprise wise rethinking of authentication, authorization, access to data, auditing and accountability in order to protect the IT backbone powering government. Identity is also at the...
August 14, 2024
Organizer:
GovExec Location:
Virtual
Mastering your Zero Trust Journey with...
Implementing the Zero Trust framework is a comprehensive endeavor encompassing people, processes, and technology. For State and Local Agencies and Education Institutions, maintaining uninterrupted operations around the clock is crucial, especially in increasingly threatened and complex environments with distributed users, applications, and resources. Integrating tools to consistently enforce policies and automate processes across the entire en...
Next in Zero Trust - Visibility and Sto...
The zero-trust approach to cybersecurity starts with an assumption that breaches will occur, whether from inside or outside the organization. Much like any other type of organization, federal agencies have multiple attack avenues — multiple endpoints per user, internet of things devices and hybrid infrastructures of data centers, edge computing, and numerous commercial clouds. How are agencies ensuring their zero-trust strategy goes beyo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.