Back to Search Begin New Search Save Search Auto-Notify
CISO Handbook: Managing Supply Chain Ri...
During this exclusive CISO Handbook webinar, moderator Justin Doubleday will explore some of the challenges and best practices associated with supply chain security with Gerald Caron, the chief information officer at the Department of Homeland Security’s Office of the Inspector General. Additionally, Kelly White, the co-founder and president of RiskRecon, a Mastercard Company will provide an industry perspective. Learning objectives: Sup...
July 14, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Accelerating Zero Trust Implementations...
OMB’s memorandum M-22-09, “Moving the U.S. Government Towards Zero Trust Cybersecurity Principles,” is setting deadlines for implementation across the government. Specifically, the memo calls out the end of FY24 – an extremely short time frame in government circles – for multiple actions across the CISA-defined five pillars of a Zero Trust Architecture. One of the most important actions is for agencies to move to...
July 7, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Army Tech Talk: Build a Zero Trust Arch...
Join this session to see capability demonstrations and learn how to comply with requirements under the Executive Order, including: Native Encryption, Key Management, and Multi-factor Authentication Auditing & Logging: Audit logs can be forwarded for collection and analysis to internal SIEMs for retention and analysis Optimize Virtualization and Infrastructure Management with predictive analytics and task automation. Network Segmentation: D...
July 5, 2022
Organizer: NUTANIX
Location: Webcast
Add Favorite
Strengthening Cybersecurity in State an...
Most IT leaders acknowledge the growing threat from ransomware, however many state and local governments are unprepared to prevent or respond to it. When an agency does not know the blast radius of an attack, whether sensitive data is affected, or how long it may take to recover, the only option they are often left with is to pay up. In order to protect themselves against an organized, well-resourced attacker agencies need a strong security po...
June 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
How a Modern Security Framework Adds Mo...
Ensuring operational integrity is not just about having up-to-date security patches and a network firewall. A multi-layered approach can help your organization address digital transformation and stay secure in a constantly changing world. To learn more, join the live webinar June 28th at 11:00AM PT/2:00PM ET as we unpack need-to-know information about achieving the most modern levels of security. Hosted by Government Technology and iland, this...
June 28, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Zero Trust Cyber Exchange
The clock is ticking. Agency IT and security teams have until August 2024 to implement zero trust architectures (ZTAs), as directed by the Biden administration executive order on improving the nation’s cybersecurity. The goal? To increase their security rigor as the perimeters of federal networks have become increasingly dynamic, and to defend against persistent threat campaigns aimed at government systems, networks, users and data. Over...
June 21-24, 2022
Organizer: Federal News Network
Location: Virtual
Add Favorite
okta Gov Identity Summit 2022
Identity underpins every public sector priority today, and identity modernization unleashes the full potential of digital government. The 2022 Okta Gov Identity Summit brings together top leaders from the public sector community to address the urgency of identity modernization. They will discuss how cloud-smart identity accelerates zero trust adoption, strengthens national defense, fights fraud, and improves customer experiences. Experts will...
June 23, 2022
Organizer: CyberScoop
Location: Arlington, VA
Add Favorite
Keys to Securing Your Cyber Interests:...
As ransomware attacks rise and hybrid work continues to be prominent, cybersecurity is more important than ever. Building a reliable Zero Trust Architecture is essential to securing an organization’s cyber interests, as is learning a data-centric approach to cyber-resiliency. How does a Zero Trust Architecture allow an organization to achieve top-notch cybersecurity? And how can that approach not only improve overall security, but also p...
June 23, 2022
Organizer: GovExec Media
Location: Webcast
Add Favorite
Basic Cyber Hygiene and Zero Trust Principles
The federal government places a lot of emphasis on basic cyber hygiene practices that employees should use, such as using unique passwords for every application and changing them regularly, guarding against clicking on suspect links buried in emails, and backing up data frequently. The Cybersecurity and Infrastructure Security Agency (CISA) offers a wide range of cyber hygiene services to help agencies improve their cybersecurity postures thro...
June 23, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Data-Driven Government: Best Practices...
Join us for a panel discussion where we will feature leaders from government, education, and industry. During this webinar we will cover the following topics including: Emerging trends and best practices in government and education from around the USA -Data automation and staff augmentation The reality of zero trust Legacy systems, cloud and AI Citizen experience, chatbots and APIs -The decade of tech and the future of data-driven government D...
June 21, 2022
Organizer: Arrow Electronics | immixGroup
Location: Virtual
Add Favorite
Back to Search Begin New Search