The Rise of Phishing-Resistant MFA: How...
The Federal Government has spent a long time developing efficient, strong security practices to verify and authenticate identities—and for good reason. We’ve seen how incompatible authentication mechanisms hinder interagency communication and collaboration, as well as how weak authentication mechanisms leave the Federal Government vulnerable to exploits. Over the years, a variety of policies and memos—as well as high-profile...
June 16, 2022
Organizer:
ATARC Location:
Webcast
Keeping Agencies Secure: The Shift to Z...
What are some of the biggest zero trust trends that agencies have seen over the past year? During this exclusive webinar, we will explore some of the challenges that organizations have faced in moving toward zero trust and evolving their identity and access management strategies. Agency leaders will discuss their considerations and recommendations for balancing security with customer service for both their citizens and their employees. Learnin...
Zero Trust with Zero Exceptions
The last 24 months have shown that the workplace is no longer a place; it’s an activity. With apps used everywhere, 80% of organizations have adopted a hybrid cloud strategy.1 In fact, they’ve used an average of 110 SaaS apps within their environments. Simultaneously, users are now everywhere. 76% of employees want to work hybrid, even after the pandemic.3 All of this brings new cybersecurity challenges, which means organizations n...
Adopting a Zero Trust Security Model
What role does identity and access management (IDAM) play in the move to a zero trust model? During this exclusive webinar, we will discuss the ways in which agencies plan to expand and enhance their IDAM capabilities in the immediate future. We will also explore how these agencies are applying micro segmentation to their business models and how they mitigate risk, particularly in their supply chains. Learning objectives: The Incorporation of...
Approaching Zero Trust Holistically
The U.S. military understands the importance of strategy, and planning out the logistics of supporting that strategy. Once the big objective is determined, leaders determine the strategy that will achieve it, then work upstream, identifying the materials and manpower required, the order of events, bottlenecks to be addressed, and so on.This approach should apply to the entire federal government’s efforts to implement zero trust. The obje...
June 8, 2022
Organizer:
FEDINSIDER Location:
Webcast
What Zero Trust Means for You and Your Agency
Zero trust security is coming. Not just because it plays a central role in the cyber executive order and other mandates and guidance. Zero trust is coming because it's essential to improving security. It enables agencies to ensure that the right people have the right access to applications, data and other resources needed to get their job done and further their agency's mission. Join us online Tuesday, June 7 at 2 p.m. ET/11 a.m. PT to hear fr...
June 7, 2022
Organizer:
GovLoop Location:
Webcast
Accelerating Special Operations Moderni...
From the ever-expanding threat landscape to the prevalence of remote work, there is a critical need to transform and evolve the technology powering U.S. Special Operations Command (USSOCOM). A modern environment provides the updated networking, cybersecurity, data strategy, and remote work capabilities required for mission success at a global level. During this digital event, GovExec will sit down with USSOCOM and private-sector leaders at the...
Zeroing in on Applications and Data: 20...
Agencies are aggressively adopting Zero Trust principles. But, while agencies strive to meet requirements, what roadblocks do they face? Which of OMB’s zero trust security pillars (identity, device, network, application, and data) are taking precedence, and which are falling behind? MeriTalk and Merlin Cyber surveyed more than 150 Federal cybersecurity executives to explore momentum, priorities, and challenges around the evolution to zer...
June 1, 2022
Organizer:
MeriTalk Location:
Webcast
6th Annual Joint C2 Summit
DSI’s 6th Annual Joint C2 Summit, previously the Joint Networks Summit, is a ‘Town-Hall’ style discussion that will bring together members of the DoD, Military Services, Allied Nations, Industry, & Academia to focus on evolving current command and control systems for joint multi / all domain operations with a focus on the people, processes, authorities and technologies needed to field a meaningful and robust unified netwo...
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to attend two sessions on various topics that your organization may be interested in:Session One: May 25 - Cybersecurity Maturity Model Certification (CMMC)Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0Clarifications on the different phases of inclusion for bidders, contractors, and service providersHow the Executive Orde...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.