Securing Civilian Agencies
Civilian government agencies need robust solutions that align with stringent federal mandates and Zero Trust security frameworks. CrowdStrike not only meets these federal mandates but also ensures compliance with M-21-31, effectively supporting civilian agencies in meeting critical cybersecurity requirements. Join CrowdStrike’s Federal team for a virtual event on July 17th to see how Falcon Next-Gen SIEM effectively addresses these needs...
Mission First Network
In an era where cyberwarfare is a pivotal element of national security, federal organizations require a network infrastructure that is as dynamic and resilient as the missions it supports. The Juniper Networks’ mission-first network solution, anchored on the innovative Juniper Session Smart Router, offers a transformative approach to secure, resilient connectivity. This self-driving, intent-based network fabric is designed to rapidly tra...
OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
Strengthening Government Resilience Aga...
Government facilities were the third largest ransomware target in 2023, highlighting the need for secure storage. As a result, federal leaders are exploring and implementing cutting-edge tools to proactively tackle emerging ransomware threats. Secure storage solutions offer a means to safeguard digital assets and sensitive data so that cybersecurity and IT teams can fortify their agencies’ resilience against evolving attacks. Join Nextgo...
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer:
ATARC Location:
Webcast
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
Journey to Zero Trust: Partnering for S...
As federal government and defense organizations strive to meet demands for data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, the federal government and defense organizations need to adopt a modern security approach like Zero Trust. Join us in Tysons Corner on Thursday, June 20th, and learn how to balance the demands of public service with the need for strong secu...
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
Delivering Cloud Native Applications at...
In the U.S. military, there are many different software factories and application platforms that don't work well together. Starting at the tactical edge, Rancher Government Solutions, HashiCorp and their partners, in collaboration with the U.S. Air Force, have designed and implemented a cloud native and hyper-converged software stack that enables choice and flexibility across all platforms. This solution standardizes on a strong zero trust arc...
Assuring Change: Infusing Zero Trust in...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.