Back to Search Begin New Search Save Search Auto-Notify
The Rise of Phishing-Resistant MFA: How...
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. We’ve seen how incompatible authentication mechanisms hinder interagency communication and collaboration, as well as how weak authentication mechanisms leave the Federal Government vulnerable to exploits. Over the years, a variety of policies and memos—as well as high-profile...
June 16, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Keeping Agencies Secure: The Shift to Z...
What are some of the biggest zero trust trends that agencies have seen over the past year? During this exclusive webinar, we will explore some of the challenges that organizations have faced in moving toward zero trust and evolving their identity and access management strategies. Agency leaders will discuss their considerations and recommendations for balancing security with customer service for both their citizens and their employees. Learnin...
June 16, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Zero Trust with Zero Exceptions
The last 24 months have shown that the workplace is no longer a place; it’s an activity. With apps used everywhere, 80% of organizations have adopted a hybrid cloud strategy.1 In fact, they’ve used an average of 110 SaaS apps within their environments. Simultaneously, users are now everywhere. 76% of employees want to work hybrid, even after the pandemic.3 All of this brings new cybersecurity challenges, which means organizations n...
June 15, 2022
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
Adopting a Zero Trust Security Model
What role does identity and access management (IDAM) play in the move to a zero trust model? During this exclusive webinar, we will discuss the ways in which agencies plan to expand and enhance their IDAM capabilities in the immediate future. We will also explore how these agencies are applying micro segmentation to their business models and how they mitigate risk, particularly in their supply chains. Learning objectives: The Incorporation of...
June 9, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Approaching Zero Trust Holistically
The U.S. military understands the importance of strategy, and planning out the logistics of supporting that strategy. Once the big objective is determined, leaders determine the strategy that will achieve it, then work upstream, identifying the materials and manpower required, the order of events, bottlenecks to be addressed, and so on.This approach should apply to the entire federal government’s efforts to implement zero trust. The obje...
June 8, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
What Zero Trust Means for You and Your Agency
Zero trust security is coming. Not just because it plays a central role in the cyber executive order and other mandates and guidance. Zero trust is coming because it's essential to improving security. It enables agencies to ensure that the right people have the right access to applications, data and other resources needed to get their job done and further their agency's mission. Join us online Tuesday, June 7 at 2 p.m. ET/11 a.m. PT to hear fr...
June 7, 2022
Organizer: GovLoop
Location: Webcast
Add Favorite
Accelerating Special Operations Moderni...
From the ever-expanding threat landscape to the prevalence of remote work, there is a critical need to transform and evolve the technology powering U.S. Special Operations Command (USSOCOM). A modern environment provides the updated networking, cybersecurity, data strategy, and remote work capabilities required for mission success at a global level. During this digital event, GovExec will sit down with USSOCOM and private-sector leaders at the...
June 7, 2022
Organizer: GovExec Media
Location: Webcast
Add Favorite
Zeroing in on Applications and Data: 20...
Agencies are aggressively adopting Zero Trust principles. But, while agencies strive to meet requirements, what roadblocks do they face? Which of OMB’s zero trust security pillars (identity, device, network, application, and data) are taking precedence, and which are falling behind? MeriTalk and Merlin Cyber surveyed more than 150 Federal cybersecurity executives to explore momentum, priorities, and challenges around the evolution to zer...
June 1, 2022
Organizer: MeriTalk
Location: Webcast
Add Favorite
6th Annual Joint C2 Summit
DSI’s 6th Annual Joint C2 Summit, previously the Joint Networks Summit, is a ‘Town-Hall’ style discussion that will bring together members of the DoD, Military Services, Allied Nations, Industry, & Academia to focus on evolving current command and control systems for joint multi / all domain operations with a focus on the people, processes, authorities and technologies needed to field a meaningful and robust unified netwo...
May 25-26, 2022
Organizer: Defense Strategies Institute
Location: Alexandria, VA
Add Favorite
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to attend two sessions on various topics that your organization may be interested in:Session One: May 25 - Cybersecurity Maturity Model Certification (CMMC)Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0Clarifications on the different phases of inclusion for bidders, contractors, and service providersHow the Executive Orde...
May 25, 2022
Organizer: VMware Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search