Implementing Zero Trust Across Industry...
Join us for a moderated panel discussion about "Zero Trust" and how agencies, organizations, and businesses can implement it to protect themselves against ever-increasing cyber threats.
Implement the New NIST RMF Standards an...
The new Presidential Executive Order has increased emphasis on advancing toward “Zero-Trust Architecture” and “Endpoint Detection and Response (EDR)”, and moving systems to FedRAMP clouds. Additionally, NIST has released the finals of many Risk Management Framework (RMF) standards (SP800-53 Rev 5 – Security Controls, SP800-53B – Security Control Baselines, Privacy Framework, SP800-160 Vol 2 – Systems S...
SASE Converge 2022
The concept of work has been completely transformed. It is no longer a location, but an activity. This new era of hybrid work means a new generation of never-before-seen threats. Is your network ready? To succeed in this new world, we need to reimagine our infrastructure to support the flexibility demanded by the modern workforce - without compromising security or user experience. ZTNA 2.0 provides you a critical first step in accomplishing a...
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
Taking Zero Trust to the Next Level of...
Cyber threats to federal agencies continue to evolve, requiring equal agility in defending against them. To address the scope of the risk, the White House released Executive Order (EO) 14028 on improving the nation’s cybersecurity in May 2021. It outlined security best practices, including how the federal government must advance toward a zero trust architecture to keep pace with today’s dynamic and increasingly complex cyber threat...
September 13, 2022
Organizer:
FEDINSIDER Location:
Webcast
CISO Handbook: ICAM and Zero Trust
During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Ross Foard, ICAM subject matter expert with the Cybersecurity and Infrastructure Security Agency will explore how ICAM factors into zero trust and other modern security practices. In addition, Bryan Murphy, senior director at CyberArk, will provide an industry perspective. Learning objectives: ICAM overview at CISA How ICAM factors into zero trust Industry analysis
Network Security 2022 Bonus Session: Ze...
The Zero Trust framework is based on the principle of "never trust, always verify." Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.
Meeting Mandates with Identity-Driven Z...
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a zero trust architecture strategy. The purpose of the mandate is to defend against sophisticated penetrations by adversaries, whether nation-states or criminals, and it emphasized that identity management and access controls are key components. Taken together, identity and access controls mean that privileged access...
September 1, 2022
Organizer:
FEDINSIDER Location:
Webcast
Heightened Visibility is Key to Efficie...
Today’s sophisticated threat environment targets end users by duplicating the relevant content they’re used to interacting with or interested in learning about. With email scams taking advantage of everyday requests and current events, these attacks are no longer obvious examples of malicious activity. Increased visibility into an environment is necessary for local and state governments to efficiently protect their systems. These i...
Architecting Zero Trust Networks with G...
With the ever-growing risk of network threats and bad actors, many organizations are turning to zero trust networks to ensure that only trusted users and devices are given access. In this session, we’ll discuss what zero trust networks are, what risks they mitigate, and common patterns found in a dynamic microservices environment.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.