Cisco Zero Trust Workshop: Strategy and...
70%. That’s the number of organizations that are considering a zero-trust framework following the massive shift to remote working and the new level of advanced threats to the business. We understand the importance of having a plan and a practice around zero-trust now more than ever before. Join us for a virtual hands-on workshop to assess your zero-trust readiness and take your security expertise to new heights. In this workshop, you wil...
September 27, 2023
Organizer:
Cisco Location:
Webcast
Breaking the System into Tiny Little Pi...
The cybersecurity slogan for zero trust is a simple one: Never trust, always verify. States, localities, tribes and territories face the same cyber threats as the federal government, and many of their agencies are wrestling through how they can implement zero trust architectures. One of the most important elements in pursuing zero trust is implementing microsegmentation — partitioning a network into small, isolated sections to reduce the...
September 27, 2023
Organizer:
FedInsider Location:
Webcast
Digital Identity Protection Day
Don't miss this one-day event where industry analysts, customers, partners, and experts will explore identity-first security trends and zero-trust initiatives. Join our Digital Identity Protection Day to discover how to ensure and manage trusted identities for machines, workloads, applications, and cloud services to keep your organization secure.
ATARC Zero Trust Lab Phase 2 Demonstrat...
Blackwood has assembled a comprehensive zero-trust environment used to architect, integrate, test, and deploy numerous technologies aimed at aligning with zero-trust frameworks and methodologies. In partnership with ATARC, Blackwood has demonstrated comprehensive coverage of the various scenarios established by the Zero-Trust Working Group.
September 22, 2023
Organizer:
ATARC Location:
Virtual
AI: Friend or Foe?
Artificial Intelligence (AI) has proven to be a groundbreaking development in human efficiency and the way people create, structure, and build upon their lives in and out of work. However, these same tools now also lie in the hands of users with malicious intentions, making it much more difficult for IT professionals to stay ahead of cyber criminals. Generative AI tools are still very new, and there is immense potential for them to change the...
September 22, 2023
Organizer:
Threatlocker Location:
Webcast
SECtember 2023
SECtember 2023 is the essential industry conference to assist organizations in elevating their cybersecurity capabilities. Taking place September 18th-22nd in Bellevue, WA, just a ride share away from the centers of cloud innovation, SECtember 2023 is bringing together leading experts at the forefront of cloud security, providing deep insights into how organizations, industries and nations are protecting their most vital assets and systems in...
Interactive Zscaler Architectural White...
But do you know why it matters, what it means for your organization, and how to start? Join Zscaler, in a live session where we will answer these questions and those you bring in an interactive whiteboard discussion. Through clear visuals, we will help you to understand how castle-and-moat and hub-and-spoke architectures make your organization more susceptible to cyberattacks, data loss, and poor user experience. We will also demonstrate what...
September 21, 2023
Organizer:
Zscaler Location:
Webcast
Implement the New NIST RMF Standards an...
This training seminar will make sense of all the recent changes and assist class participants in implementing the changes to successfully meet your FY23 RMF security and FISMA Metrics. The course was built on the popular two-day Meeting FISMA Requirements course that has been taught for the past 12 years. All exercises are new to ensure they relate to current systems and solutions use practical strategies for leveraging recent changes into mee...
Enabling and Securing Government ...
As governments and educational institutions strive to meet public demands for access to data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to adopt a modern security approach like Zero Trust. Join us in Baton Rouge to hear from industry experts and peers from Okta, Zscaler, CrowdStrike and AWS. You'll learn how to bala...
Who Are You - and Can You Prove It? Ide...
One of the foundational tenets of zero trust architecture is Identity – providing credentials for every person and device – in order to manage access to government systems, whether entering from the outside or moving laterally from within. In other words, identity, credential and access management (ICAM) should be addressed as a whole, not as separate point solutions. This applies across all systems, all platforms, and all environm...
September 20, 2023
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.