Back to Search Begin New Search Save Search Auto-Notify
Securing Civilian Agencies
Civilian government agencies need robust solutions that align with stringent federal mandates and Zero Trust security frameworks. CrowdStrike not only meets these federal mandates but also ensures compliance with M-21-31, effectively supporting civilian agencies in meeting critical cybersecurity requirements. Join CrowdStrike’s Federal team for a virtual event on July 17th to see how Falcon Next-Gen SIEM effectively addresses these needs...
July 17, 2024
Organizer: CrowdStrike Government Team at Carahsoft
Location: Webcast
Add Favorite
Mission First Network
In an era where cyberwarfare is a pivotal element of national security, federal organizations require a network infrastructure that is as dynamic and resilient as the missions it supports. The Juniper Networks’ mission-first network solution, anchored on the innovative Juniper Session Smart Router, offers a transformative approach to secure, resilient connectivity. This self-driving, intent-based network fabric is designed to rapidly tra...
July 16, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
OT/IoT Zero Trust Security for Water an...
Recently, there has been a surge in alerts and warnings concerning cyberattacks from state-sponsored threat actors on U.S. critical infrastructure including water systems and electric distribution systems. EPA, CISA, and the FBI strongly recommend system operators take steps outlined in Top Actions for Securing Water Systems. In addition, DOE has released the Cybersecurity baseline and NERC has nearly finalized the update to CIP-015-1. Both gu...
July 11, 2024
Organizer: Zscaler Government Team at Carahsoft
Location: Webcast
Add Favorite
Strengthening Government Resilience Aga...
Government facilities were the third largest ransomware target in 2023, highlighting the need for secure storage. As a result, federal leaders are exploring and implementing cutting-edge tools to proactively tackle emerging ransomware threats. Secure storage solutions offer a means to safeguard digital assets and sensitive data so that cybersecurity and IT teams can fortify their agencies’ resilience against evolving attacks. Join Nextgo...
July 9, 2024
Organizer: Nextgov/FCW
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Journey to Zero Trust: Partnering for S...
As federal government and defense organizations strive to meet demands for data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, the federal government and defense organizations need to adopt a modern security approach like Zero Trust. Join us in Tysons Corner on Thursday, June 20th, and learn how to balance the demands of public service with the need for strong secu...
June 20, 2024
Organizer: Zscaler Government Team at Carahsoft
Location: Vienna, VA
Add Favorite
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
June 18, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Delivering Cloud Native Applications at...
In the U.S. military, there are many different software factories and application platforms that don't work well together. Starting at the tactical edge, Rancher Government Solutions, HashiCorp and their partners, in collaboration with the U.S. Air Force, have designed and implemented a cloud native and hyper-converged software stack that enables choice and flexibility across all platforms. This solution standardizes on a strong zero trust arc...
June 11, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Assuring Change: Infusing Zero Trust in...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search