Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
FedTalks
The federal government is in the midst of an ongoing digital transformation that has the potential to reinvent the way agencies provide citizen services and perform their most essential functions. Guided by the top priorities of the White House, leaders across the federal government are embracing modern technologies like generative AI and the cloud, fortifying cybersecurity by shifting to zero-trust architectures and embracing post-quantum cry...
September 18, 2025
Organizer:
FedScoop Location:
Washington, DC
Hot Topics in Cybersecurity Day 3: The...
The federal mandate that agencies utilize a Zero Trust architecture to strengthen cybersecurity has been in place for four years, and most federal agencies have made excellent progress toward meeting the deadlines spelled out in the Executive Order. State and local governments are not covered by the federal EO, but many of them are pursuing their own zero trust policies or evaluating how to implement them. After all, having a zero trust archit...
September 18, 2025
Organizer:
FedInsider Location:
Webcast
Zero Trust in Action: Securing the Miss...
As Zero Trust continues to shift from policy to practice across the federal government, IT leaders are under pressure to rethink how access, identity, and risk are managed in today’s complex, hybrid environments. This discussion will explore how organizations are moving beyond perimeter-based models to adopt dynamic, identity-driven architectures that can that support mission resilience – especially in contested, disconnected, inte...
September 18, 2025
Organizer:
ATARC Location:
Webcast
2025 SANS Zero Trust Survey Webcast ...
As digital transformation accelerates, Zero Trust has become crucial for defending against an increasingly complex threat landscape. The rise in ransomware, credential stealers, supply chain attacks, and disruptive incidents impacting availability in 2024 has underscored the need for resilient cybersecurity strategies that can withstand and adapt to evolving threats. Our 2025 survey focuses on how Zero Trust principles, such as identity manage...
Government Cybersecurity Showcase Penns...
Pennsylvania is making critical investments in cybersecurity to protect its digital infrastructure and safeguard citizen data. With increasing cyber threats targeting state and local governments, agencies must stay ahead of evolving risks. The Commonwealth has prioritized cybersecurity funding, leveraging both state and federal resources to modernize defenses, enhance resilience, and build a more secure digital future. As agencies continue to...
Building the Zero Trust Framework on El...
In today’s threat landscape, public sector organizations must adopt a proactive and adaptive security posture. This session explores how to architect a scalable Zero Trust framework by integrating Elastic’s powerful observability and analytics platform with Gigamon’s deep network telemetry. During this webinar, attendees will learn:How to leverage enriched network metadata to gain real-time visibility, detect lateral movement...
Blue Team Con
Blue Team Con is the only annual in-person conference created for cybersecurity defenders, inclusive of anyone interested in safeguarding organizations. Join more than 700 community-minded defensive cybersecurity experts for information sharing, relationship and career building events, and defense-focused talks held by some of the industry’s leading cybersecurity minds. Earn CPE credits in every one of our Trainings and Talks – ove...
September 6-7, 2025
Organizer:
Blue Team Con Location:
Chicago, IL
The Evolution of Cloud Network Security...
This webinar offers cloud network security experts an in-depth look at the paradigm shift from traditional perimeter-based security to a modern application-centric approach. Discover why conventional data center security models, relying on static policies and firewalls, are ill-suited for the dynamic nature of cloud environments, which are characterized by the explosive growth of IaaS, PaaS, and SaaS. We will explore the critical challenges po...
Mission-Ready Cybersecurity
Automation has the power to revolutionize how agencies make decisions and detect threats—but only if built on a strong cybersecurity foundation. For federal civilian agencies, that foundation begins with Zero Trust architecture. As threats grow more sophisticated, compliance requirements tighten, and the need for secure, real-time data access expands across decentralized environments, the ability to orchestrate across the Zero Trust pill...
August 28, 2025
Organizer:
Netskope Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.