The Lightning Round: What is Zero Trust?
State and local government leaders encounter new buzzwords and tech jargon every day. In The Lightning Round, a new webinar series from Government Technology, we’re explaining these emerging concepts and demystifying gov tech one buzzword at a time. In this episode, we’re looking at Zero Trust. It has quickly emerged as an essential part of a modern cybersecurity framework. But what exactly does Zero Trust security mean? How has t...
CSA Federal Summit
An Iron Will: Building Cyber Resilience in 2023 With cloud firmly entrenched as the primary IT system worldwide and cloud security now the foundation of cybersecurity programs, establishing cyber resilience across IT portfolios has become imperative. Threats to national cybersecurity continue to take center stage, including supply chain attacks, malware, and an ever-growing list of vulnerabilities. As nation-states conduct more and more cyber...
Nutanix Security: A Zero Trust Approach
Nutanix Zero Trust is a simple, secure control and management plan that works to build and run secure user applications using secure data management.It can be difficult for any organization, especially one with budget constraints and small I.T. teams, to implement security strategies equal to the challenges faced by modern cyber threats. Building Zero Trust environments that don't compromise agility and speed of provisioning seems almost impos...
Bringing Zero Trust to the State and Lo...
Cybersecurity protocols have evolved rapidly over the past year, due in part to zero-trust priorities set within President Joe Biden’s May 12 Executive Order. However, there remain barriers to this momentum at the state and local level. This webcast unpacks these very barriers and explores the state and local approach to zero-trust architectures.
Stepping Beyond the ZTNA Hype
We’ve been hearing about Zero Trust Network Architectures (ZTNA) for a while now—but what’s the current reality? In this webinar, Chris Ray, cybersecurity veteran and author of GigaOm’s Radar for Zero-Trust Network Access (ZTNA), will explore the state of ZTNA adoption today, the business and technology factors driving it forward, and how organizations can successfully evolve their secure access architecture to protect...
October 12, 2022
Organizer:
Citrix Location:
Webcast
(ISC)2 Security Congress
(ISC)² Security Congress turns the spotlight on cutting-edge collaboration and learning for thousands of cybersecurity professionals from all over the world, October 10-12, 2022, at Caesars Palace Las Vegas and virtually. Watch for announcements about star keynotes, hundreds of educational sessions, and Vegas-style networking events planned for you in person and virtually next fall.
October 10-12, 2022
Organizer:
(ISC)² Location:
Las Vegas, NV
Zero Trust-based Remote Access for Oper...
Zero Trust Network Access (ZTNA) solutions brought simplicity, scalability and more security for IT remote access use cases. This is long overdue for industrial cybersecurity. Traditional IT security approaches such as VPNs and Jump servers as well as IT security oriented ZTNA solutions have several limitations and complexity when it comes to providing streamlined and fully secure remote access for an Operational Technology (OT) environment wh...
Blue Team Summit & Training 2022
Level Up Your Blue Team SkillsThe blue team represents information security professionals on the front line of defending an organizations critical assets and systems against attacks and threats from adversaries. Defending against attacks is an ongoing challenge with new threats emerging all the time. At the SANS Blue Team Summit, enhance your current skill set and become even better at defending your organization and hear the latest ways to mi...
October 3-10, 2022
Organizer:
SANS Location:
Scottsdale, AZ
Native Cryptographic Networking
The internet has evolved from a best-effort IP network for file sharing, email and browsing to a network at the center of a digital revolution in the way we live, work and play. Every sector — from industry and commerce to the federal government — now relies on IP networks for connectivity and everyone expects real-time responsiveness, secure connectivity and 100% reliability. Protecting data and interactions are more important tha...
Headlines in Cybersecurity - What State...
The federal government is well ahead of state and local governments in the implementation of a zero trust architecture because of the White House Executive Order on Cybersecurity last year. But state and local agencies see it in their immediate future - 67 percent of state CIOs who responded to the 2021 Annual State CIO Survey anticipate that introducing or expanding a zero-trust framework will receive more attention in the next two to three y...
October 6, 2022
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.