Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
From Risk to Resilience: Transitioning...
VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances...
February 15, 2024
Organizer:
Zscaler Location:
Webcast
Applying Zero Trust Architecture in Sta...
State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies’ IT systems and technical support staff. Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter ...
February 13, 2024
Organizer:
FedInsider Location:
Webcast
CyberSmart 2024: Facing a Rapidly Chang...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance,...
February 9, 2024
Organizer:
FedInsider Location:
Webcast
Workloads at the Tactical Edge Forum
Battle fields are constantly evolving and becoming ever-more digitally connected. As such, Cyber-Physical risks are more prevalent across our most critical sectors, and the threat landscape continues to expand. Moreover, Geopolitical events dictate that the only certainty is uncertainty. Against this backdrop, the United States Government and its military leaders are enhancing operational capabilities to mitigate risk spanning our complex infr...
The Identity Catalyst: Accelerating Zer...
A decade ago, the Continuous Diagnostics and Mitigation (CDM) Program put agencies on the right path with critical investments in identity and access automation, but technology hasn’t stood still. Today, the Federal Zero Trust Strategy aims to accelerate cyber maturity throughout the government and secure our nation’s future. At the same time, relentless innovation in Artificial Intelligence is changing the game for attackers and d...
February 8, 2024
Organizer:
ATARC Location:
Webcast
Cisco Zero Trust Workshop: Strategy and...
70%. That’s the number of organizations that are considering a zero-trust framework following the massive shift to remote working and the new level of advanced threats to the business. We understand the importance of having a plan and a practice around zero-trust now more than ever before. Join us for a virtual hands-on workshop to assess your zero-trust readiness and take your security expertise to new heights. In this workshop, you wil...
February 7, 2024
Organizer:
Cisco Location:
Webcast
Zero Trust with Zero Budget
Adoption of a zero trust architecture is critical to secure networks and protect sensitive data. While investing in new technology is an option, some businesses may not have resources available for these investments. Join us for a breakfast and panel discussion focused on how to leverage current capabilities in your IT architecture to improve cybersecurity aligned with Zero Trust principles.
What You Need to Know About the Threat...
Zero-trust cybersecurity has been the Administration’s goal for a few years now. So that begs the question, what are the current and most pressing threats that are waging war against the zero-trust methodology? Join us online Wednesday, Feb. 7 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government and industry experts about the current threat landscape and what should be on your radar for 2024.
February 7, 2024
Organizer:
GovLoop Location:
Webcast
Unlocking Zero Trust: Strategic Approac...
How do AI, cloud computing and analytics fit into creating a successful zero trust strategy? Join moderator Jason Miller, and agency and industry leaders on Feb. 7 at 2 p.m. to gain insights into the critical aspects of Zero Trust Architecture and how it can help reshape and innovate your cybersecurity approach. Learning objectives: Modernizing security through zero trust Navigating the zero trust culture shift Applying automation in security
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.