Back to Search Begin New Search Save Search Auto-Notify
Building a Zero Trust Architecture Depl...
Building a Zero Trust Architecture is a complex task, but with the new National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide, you can build a plan to get there. Radiant Logic, the platform that puts identity to work to achieve Zero Trust, can deliver a single source of correlated identity data across all existing directories and identity-related databases to create a Policy Information Point (PIP), a critical compo...
August 25, 2022
Organizer: Radiant Logic Government Team at Carahsoft
Location: Webcast
Add Favorite
Demystifying Zero Trust for Government...
Is your agency worried about Zero Trust compliance, with zero plan in place? You’re not alone. In this webinar, Pluralsight’s Sr. Security Author Brandon DeVault breaks down what you need to know about Zero Trust so your team—and your tech—are ready for it. Don’t worry. It’s not as daunting as it seems. You’ll learn how to: Create an action plan and timeline for your workforce to comply with the recent...
August 25, 2022
Organizer: Pluralsight
Location: Webcast
Add Favorite
Demystifying Zero Trust for Government...
Is your agency worried about Zero Trust compliance, with zero plan in place? You’re not alone. In this webinar, Pluralsight’s Sr. Security Author Brandon DeVault breaks down what you need to know about Zero Trust so your team—and your tech—are ready for it. Don’t worry. It’s not as daunting as it seems. You’ll learn how to: Create an action plan and timeline for your workforce to comply with the recent...
August 25, 2022
Organizer: Pluralsight
Location: Webcast
Add Favorite
Top 5 Zero Trust Practices to Stop Mode...
Modern attacks like ransomware and supply chain attacks can start from anywhere in the kill chain – endpoints, identities or cloud workloads. Zero Trust, if deployed correctly, can be the answer to increasing real-time security coverage and reducing the attack surface in the hybrid enterprise. However, with the rapidly evolving adversarial tactics and techniques behind modern attacks, organizations need to not only operationalize Zero Tr...
August 24, 2022
Organizer: Cloud Security Alliance
Location: Webcast
Add Favorite
10th Annual 930GOV Where IT Comes Together
930gov is the largest, longest-running, multi-sponsored conference for government IT. 930gov is a multi-track, conference where government technical communities connect, exchange, and gather ideas from thought-leaders from each community. Topics for the 2022 conference include: Records Management Federal Data Strategy Cyber/Zero Trust Cloud/Modernization Enterprise Architecture
August 23, 2022
Organizer: Digital Government Institute
Location: Washington, DC
Add Favorite
CISO Handbook: Centers for Medicare ...
During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Robert Wood, chief information security officer at Centers for Medicare and Medicaid Services will explore how his agency is implementing zero trust and other modern security practices. In addition, David Chow, global chief technology strategy officer at Trend Micro, will provide an industry perspective. Learning objectives: Key Considerations for the Move to a Z...
August 23, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
GovForward ICAM Workshop
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies are working to consolidate and update their identity systems to protect a broad range of access by individuals and device...
August 17, 2022
Organizer: FCW | Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Meeting Federal Zero Trust Standards wi...
In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. To meet this changing security landscape, federal agencies and the defense industrial base mus...
August 17, 2022
Organizer: AvePoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Detect Financial Fraud with Data Scienc...
Amid the rise of financial fraud in the post-pandemic world, organizations need secure, scalable, and robust methods to mitigate risks. Using SAIC's Tenjin Artificial Intelligence (AI) Platform, the highly secure Koverse Data Platform, and Tableau, stakeholders can quickly and easily gain more accurate and informative insights from complex and disparate data sources. This use case will identify predictors of fraudulent transactions, which can...
August 16, 2022
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Federal Executive Forum’s Zero Trust in...
Zero trust architecture continues to be at the forefront of government agency cyber strategies, but how are agencies implementing and managing their strategies? During this exclusive webinar, you will learn how top government technology executives are implementing strategies and technology around zero trust.
August 16, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Back to Search Begin New Search