Back to Search Begin New Search Save Search Auto-Notify
Implementing Zero Trust Across Industry...
Join us for a moderated panel discussion about "Zero Trust" and how agencies, organizations, and businesses can implement it to protect themselves against ever-increasing cyber threats.
September 15, 2022
Organizer: AFCEA Rockbridge Shenandoah Chapter
Location: Lexington, VA
Add Favorite
Implement the New NIST RMF Standards an...
The new Presidential Executive Order has increased emphasis on advancing toward “Zero-Trust Architecture” and “Endpoint Detection and Response (EDR)”, and moving systems to FedRAMP clouds. Additionally, NIST has released the finals of many Risk Management Framework (RMF) standards (SP800-53 Rev 5 – Security Controls, SP800-53B – Security Control Baselines, Privacy Framework, SP800-160 Vol 2 – Systems S...
September 14-15, 2022
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
SASE Converge 2022
The concept of work has been completely transformed. It is no longer a location, but an activity. This new era of hybrid work means a new generation of never-before-seen threats. Is your network ready? To succeed in this new world, we need to reimagine our infrastructure to support the flexibility demanded by the modern workforce - without compromising security or user experience. ZTNA 2.0 provides you a critical first step in accomplishing a...
September 13-14, 2022
Organizer: Palo Alto Networks | Prisma SASE
Location: Virtual
Add Favorite
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
Taking Zero Trust to the Next Level of...
Cyber threats to federal agencies continue to evolve, requiring equal agility in defending against them. To address the scope of the risk, the White House released Executive Order (EO) 14028 on improving the nation’s cybersecurity in May 2021. It outlined security best practices, including how the federal government must advance toward a zero trust architecture to keep pace with today’s dynamic and increasingly complex cyber threat...
September 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
CISO Handbook: ICAM and Zero Trust
During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Ross Foard, ICAM subject matter expert with the Cybersecurity and Infrastructure Security Agency will explore how ICAM factors into zero trust and other modern security practices. In addition, Bryan Murphy, senior director at CyberArk, will provide an industry perspective. Learning objectives: ICAM overview at CISA How ICAM factors into zero trust Industry analysis
September 12, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Network Security 2022 Bonus Session: Ze...
The Zero Trust framework is based on the principle of "never trust, always verify." Join us to learn about Zero Trust, how to adopt it for applications, and the technologies you need to take control of your environment in the fight against ransomware.
September 7, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Meeting Mandates with Identity-Driven Z...
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a zero trust architecture strategy. The purpose of the mandate is to defend against sophisticated penetrations by adversaries, whether nation-states or criminals, and it emphasized that identity management and access controls are key components. Taken together, identity and access controls mean that privileged access...
September 1, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Heightened Visibility is Key to Efficie...
Today’s sophisticated threat environment targets end users by duplicating the relevant content they’re used to interacting with or interested in learning about. With email scams taking advantage of everyday requests and current events, these attacks are no longer obvious examples of malicious activity. Increased visibility into an environment is necessary for local and state governments to efficiently protect their systems. These i...
August 31, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Architecting Zero Trust Networks with G...
With the ever-growing risk of network threats and bad actors, many organizations are turning to zero trust networks to ensure that only trusted users and devices are given access. In this session, we’ll discuss what zero trust networks are, what risks they mitigate, and common patterns found in a dynamic microservices environment.
August 30, 2022
Organizer: Google Cloud
Location: Webcast
Add Favorite
Back to Search Begin New Search