Back to Search Begin New Search Save Search Auto-Notify
Navigating the Future of Identity Manag...
What role does identity play at the Department of Defense as they look to the future? During this exclusive webinar, we will discuss the ways in which the Army, Air Force, the Defense Information Systems Agency and industry leaders are using their ICAM strategy to shape the future of identity in the federal landscape. Learning objectives: Current ICAM Vision Addressing the DOD Common Access Card ICAM and the Zero Trust Architecture
May 25, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
How Google Pioneered Zero Trust, Lesson...
We’re continuing the conversation from Google Cloud’s Security Summit and digging into the practical application of those core discussions. Zero Trust is at the heart of Google’s security approach, but how do complex public sector organizations take the first steps towards a Zero Trust approach, with special consideration both for security policy requirements and funding opportunities? Google Security experts will help layout...
May 20, 2022
Organizer: Google Cloud
Location: Webcast
Add Favorite
Swish - Government, Innovation, Strateg...
The past two years have brought about a decade’s worth of change to federal technology, from rapidly pivoting to and sustaining a remote, virtual-enabled workforce, to revitalizing customer experience at the heart of government’s biggest missions – all while defending against increasingly sophisticated attacks and making big bets on next generation technologies like cloud, AI and automation. And these transformations are only...
May 19, 2022
Organizer: FedScoop
Location: Washington, DC
Add Favorite
Capitalize on CDM Solutions with Ivanti
The Continuous Diagnostics and Mitigation (CDM) program from the Department of Homeland Security (DHS) has expanded to additional agencies, on top of the requirements for Zero Trust architecture, President Biden's executive order, and the Binding Operational Directive (BOD). The question is, how can an agency meet all of these federal IT mandates?Join Ivanti and Carahsoft to gain insight on the methods used to achieve CDM requirements. With ne...
May 17, 2022
Organizer: Ivanti Government Team at Carahsoft
Location: Webcast
Add Favorite
Bring Zero Trust Architecture into focu...
Zero Trust can be just out of reach for many organizations or remain stuck as an InfoSec initiative. To make Zero Trust relevant as a way of doing business, organizations use DMARC deployment as their first step in embracing Zero Trust. DMARC is an email interoperability standard that replaces the "trust everything by default and filter out bad email" model with a "trust only DMARC-compliant email" model to realize the goal of Zero Trust withi...
May 17, 2022
Organizer: Cisco
Location: Webcast
Add Favorite
Federal Breakfast Summit: Improving the...
As we have entered a new digital age, the needs and expectations of citizens have changed. Now that we have transitioned to a virtual world, we have entered challenges that our citizens and users have yet to face. Part of the underlying challenge that the users are facing is the online experience itself. This conversation aims to discuss the new Executive Order and introduce a long-overdue and positive shift in the government-citizen dynamic....
May 11, 2022
Organizer: ATARC
Location: Washington, DC
Add Favorite
Identity & Cybersecurity: Exploring the...
Less than four years ago – in May 2018 – the European Union’s landmark General Data Protection Regulation (GDRP) took effect, cementing data privacy and online activity as a foundational aspect of cybersecurity and public safety. Since then, California, Virginia and Colorado have followed with their own data privacy legislation. Other states – and possibly the federal government – will undoubtedly follow. These ne...
May 11, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Federal Executive Forum’s Zero Trust St...
The zero trust model has come to the forefront of government agency cyber strategies in the last couple of years, but how are agencies implementing and managing their zero trust strategy? During this webinar, you will learn how federal IT practitioners from the State Department, Justice Department, Immigrations and Customs Enforcement and Department of Homeland Security are implementing strategies and technology around zero trust.
May 10, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Juniper Smart Session Router and Missio...
Warfighting increasingly relies on secure undeniable connectivity. As the nation’s adversaries target critical infrastructure, joint forces must be able to continue net-enabled combat and operations in the face of overburdened infrastructure, difficult environments, determined adversaries and insider threats. Juniper’s mission-first network, anchored on the Juniper Session Smart Router, enables organizations to adapt rapidly, provi...
May 5, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
FCW Workshop: Zero Trust Marching Order...
With cyberattacks on the increase at all levels of government, The White House issued a new executive order at the end of January that requires agencies to have a zero trust architecture in place by the end of FY 2024. The Office of Management and Budget followed with a memorandum (M-22-09) that laid out the requirements agencies must meet and the deadlines for completing the tasks outlined in the document. OMB identified five areas of focus--...
May 4, 2022
Organizer: GovExec
Location: Washington, DC
Add Favorite
Back to Search Begin New Search