CYBER 2022
Join us for CYBER 2022 the deepest dive into the cybersecurity solutions for government. We have structured this collaboration with the goal of furthering the President’s Executive Order on Enhancing the Nation’s Cyber Security and will focus on: Modernizing Federal Cybersecurity, Practices that Enhance the Software Supply Chain Security, Responding to Cybersecurity Vulnerabilities and Incidents, and Improving Detection of Cybersec...
Critical Infrastructure Security Summit
The 2nd Annual Critical Infrastructure Security Summit will focus on defending and creating resilient systems to protect our nation’s vital infrastructure from outside threats and other dangers. The interconnectivity and advanced capabilities that digital systems have provided to our nation’s infrastructure systems also poses an avenue of approach for America’s enemies to cripple US production and economic power without havin...
Building Zero Trust Cyber Resiliency in...
In May 2021, President Biden issued Executive Order 14028 on improving government cybersecurity. The order required that all federal agencies develop a plan to implement zero trust architectures for their IT systems, and set aggressive timelines for achieving this goal by 2024. The National Institute of Standards and Technology defines zero trust as “an evolving set of cybersecurity paradigms that move defenses from static, network-based...
September 28, 2022
Organizer:
FEDINSIDER Location:
Webcast
HexCon22
HexCon is Hexnode’s annual conference dedicated to uniting leaders and change-makers across the globe. Now in its 3rd year, HexCon22 brings together the Hexnode community and innovators for three days of insights on the latest practices, strategies and advancements in the cybersecurity and tech field, this September 21-23.
September 21-23, 2022
Organizer:
Mitsogo Location:
Virtual
IT Asset Management in the Era of Zero Trust
During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective. Learning objectives: Thunderdome overview SOAR overview The evolution of the IT landscape Zero trust Industry analysis
The Threat Landscape is HEATing Up for...
For many workers, the browser has essentially become the office since according to a recent study by Forrester Consulting, hybrid and remote workers spend more than 75% of their working day in a web browser. Even before the need to support remote workers, the challenges for government IT and security teams was more daunting than ever with the need to modernize IT systems, comply with federal requirements, deal with technology talent shortages,...
Lessons Learned on the Zero Trust Journey
In May of 2021, the White House issued the Executive Order on Improving the Nation’s Cybersecurity, mandating that federal agencies begin taking decisive steps to modernize their approach to cybersecurity, with zero trust as the foundation. In that time, federal agencies have been diligently working to meet the Executive Order’s mandates. Last month, the Office of Management and Budget released M-22-16 Administration Cybersecurity...
September 20, 2022
Organizer:
FEDINSIDER Location:
Webcast
Virtual Roundtable: How to Migrate Work...
Join AWS, stackArmor and Carahsoft for a virtual roundtable on Tuesday, September 13th, at 2:00pm ET as we discuss migrating your workloads to the Cloud securely and easily. During this roundtable attendees will learn about the benefits of the AWS Cloud to meet the stringent security requirements necessary for protecting sensitive data. This interactive roundtable can help early starters of the Cloud with foundational use cases. If you are a f...
Top 10 Things You Didn't Know About Ent...
If Zero Trust, flexible deployments, customer service, or simplifying your journey to the cloud matter to you, there are 10 things you may not know about Symantec – but you should.The security landscape continues to evolve at a blistering pace, and there are so many great things going on with Symantec, it’s sometimes hard to keep track. Meanwhile, what you may have heard from the newest kids on the block is often meant to seed fea...
Meeting Mandates with Identity-Driven Z...
Zero Trust is about knowing who is doing what within your network and ensuring that in the event of anomalous activity, you can control and limit threats to the network. Applying the granularity of Privileged Access Management (PAM) to achieve Zero Trust objectives ensures all access is appropriate, managed, and documented, regardless of how the perimeter has been redefined. To stay agile, agencies must leverage Zero Trust principals to never...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.