Why is Packet Capture Important for Zer...
Organizations are increasingly focused on implementing Zero Trust policies to limit exposure to cyberattacks, which is admirable best practice. But how can you verify that your policies and configurations are actually working as intended? In Episode 4 of his ongoing series on using packet forensics for cybersecurity, Jake Williams looks at why packet data is an indispensable resource for verifying Zero Trust implementations and troubleshooting...
Federal Executive Forum Zero Trust in G...
Zero trust is at the forefront of every agency cybersecurity strategy. What have agencies discovered along their zero trust journey? During this exclusive webinar, you will learn how top government technology executives are implementing effective strategies and technology around zero trust.
What Resilience Means Now
Are institutions prepared to deal with escalating cyber threats and other potentially disruptive events? This session will examine the interconnections between cybersecurity, business continuity and disaster recovery — and how a holistic approach to these critical issues can strengthen resilience. We will explore topics such as: Using Zero Trust to stay ahead of increasingly numerous and sophisticated threats Building executive level sup...
2022 SANS Solutions Forum: A Practical...
There is no doubt that Zero Trust has become one of the main topics in the cybersecurity industry. Since the US Federal Government mandated agencies to accelerate the adoption of Zero Trust and issued detailed guidelines on implementing a Zero Trust Architecture in the second half of 2021, Zero Trust has become both the ‘de facto’ cybersecurity approach and a controversial concept used by some as a marketing ploy. But what is Zero...
Update: Continuous Diagnostics And Moni...
The Continuous Diagnostics and Mitigation (CDM) program is the way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to support government-wide risk-based cybersecurity solutions to assist participating agencies improve their security posture consistently and cost-effectively. In this virtual workshop, government & industry experts will provide the following: a status update on CD...
CBOM: Automating Zero-Defect Compliance...
Register for a Free Lunch & Learn Webinar on CBOM: Automating Zero-Defect Compliance at Scale. In today’s complex digital technology landscape there is an ever-evolving threat that requires securing and protecting critical infrastructure, information, and assets. Several initiatives are under way throughout the Government to support the presidential Executive Order on Improving the Nation’s Cybersecurity which includes implemen...
Department of Homeland Security Special...
Join your peers for the next DHS ServiceNow Special Interest Group (SIG) where DHS staff from across all components will share examples of innovative ways ServiceNow has been deployed in support of the DHS mission.
Virtual Zero Trust Summit
With the support of our Zero Trust Advancement Center (ZTAC) founding members, CSA is excited to host the Virtual Zero Trust Summit, November 16th-17th, to deliver critical insights into a variety of Zero Trust focused topics. Zero Trust is one of the most widely talked about cybersecurity trends today. CSA’s mission is to cut through the hyperbole and hype, and focus the conversation on building and evangelizing authoritative Zero Trust...
SANS Government Cybersecurity Solutions...
Threat actors continue to make government agencies – at the federal, state and local levels – one of their most important targets. A series of Presidential Executive Orders and DHS CISA Binding Operational Directives have been issued in response, often with specific cybersecurity control and technology requirements. Government agencies need to address both these pressures, and do it with limited resources, prioritizing their action...
Data Protection Transformed with Zscaler
Every day ransomware, data breaches, and careless user behavior put your organization's data in harm's way. Unfortunately, today's legacy approaches just aren't built to deliver the holistic intelligence needed to secure your data across all threat vectors. Join Zscaler and Carahsoft on Wednesday, November 16th for a webinar to learn how Zscaler's Zero Trust Exchange has evolved to solve today's most difficult data protection challenges throug...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.