ATARC 2022 Zero Trust Summit
Emerging Technologies are evolving at a faster pace than ever before, especially as agencies aim to implement Zero Trust Security. Throughout the adoption and integration of Zero Trust principles into any cybersecurity strategy comes with many challenges and questions. Tune into this panel to hear from topic experts on the importance of emerging technologies while agencies are in the process of adopting and implementing Zero Trust Principles.
August 9, 2022
Organizer:
ATARC Location:
Washington, DC
Implementing Proactive Security with Ze...
As Security, Compliance, Identity and Management continue to be paramount in the way our Federal Government innovates and moves toward secure cloud services, Microsoft is committed to supporting and empowering agencies efforts to implement proactive security by delivering best of breed security across all devices, platforms and endpoints. It is critical that agencies are enabled to rapidly assess and improve their security posture and with the...
Ensure End-to-End Security with a Digit...
How a Digital Twin Helps Extend Zero-Trust Initiatives Throughout the Multi-Cloud Environment Protecting federal IT systems is harder than ever. As threats continue to escalate and the transition to hybrid and multi-cloud environments accelerates, the boundaries are blurring, making it difficult to visualize and monitor systems as a whole. Federal agencies need to rapidly visualize security postures and verify compliance with the agency...
The Future of Zero Trust Access & XDR
Join Trellix, DynTek & Carahsoft for a panel discussion on August 4, as we discuss: Evolving changes in cyber liability insurance in the midst of rising attacks and claims Moving beyond the basics - mapping the core 12 security controls to optimized investments that reduce your financial liability Addressing the cyber skills gap Maximizing cybersecurity visibility, operations, and response
Incorporating Zero Trust Security Model...
Last year the President ordered federal agencies to come up with plans “to defend the vital institutions that underpin the American way of life.” The IT core of this initiative? Zero Trust - moving away from implied trust based on network location and perimeter-based security and evaluating trust on a per-transaction basis. As a result all federal agencies – and by extension most of their state, local, and tribal counterparts...
August 2, 2022
Organizer:
VMware Location:
Webcast
CISO Handbook: Securing Identity in a Z...
During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Angelica Phaneuf, chief information security officer at Army Software Factory will break down Army’s digital transformation initiatives in relation to their identity and security strategies. In addition, Matt Tarr, solutions architect at CyberArk, will provide an industry perspective. Learning objectives: Technology Initiatives at the Army Software Factory...
"Cyber & Cigars" Fireside Chat - How Se...
Join GuidePoint Security, BeyondTrust, and CrowdStrike for an in-person "Cyber & Cigars" fireside chat to hear experts discuss the risks and challenges of privileged access in network environments and the importance of securing and protecting endpoints from external and internal malicious attacks. You will hear from GuidePoint’s Federal CTO, Jean-Paul Bergeaux, and CrowdStrike and Beyond Trust experts. Q&A and networking to follo...
Forcepoint ONE
If you work in the Department of Defense, this event is for you! Join Carahsoft's Nikhil Gupta, Sales Engineer Team Lead, as we learn how to simplify cybersecurity with Forcepoint ONE. We'll spend the majority of the time going over the use cases of the solution as it applies to your needs, and there will be time throughout to share any questions or comments you may have. With Forcepoint ONE, you can enjoy: ONE Zero Trust platform for securing...
The Connection Between Zero Trust and D...
How is the Department of Navy optimizing on the connection between zero trust and DevSecOps? During this exclusive webinar, moderator Jason Miller will explore how to navigate the common trends, successes, challenges, and pitfalls of implementing a zero trust architecture with Tony Plater, the chief information security officer of the Department of Navy. Additionally, Invicti Security’s Ted Rutsch will provide an industry perspective. Le...
Building Cyber Resilience to Third-Part...
Organizations of any size go through various vendors to keep operations running and without proper controls in place, leaves organizations vulnerable to third-party breaches that may result in loss of data, downtime as well as financial losses. While third-party risk management is not a new concept, the risk of cyberattacks today is even greater as companies accelerate their digital capabilities post-pandemic. It is important for organizations...
July 19-21, 2022
Organizer:
IQPC Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.