Secure Workload Access on Your Journey...
The increasing data breaches and ransomware attacks continue to make front-page headlines. As we all know and accept now, it’s not if a breach will happen but when. The real damage continues to happen when workloads are compromised and attackers are able to move laterally— from web server, to app server to the database server, for example. Securing workloads that make up your applications is critical to the overall Zero Trust Archi...
May 4, 2022
Organizer:
VMware Location:
Webcast
Armis Zero Trust Test Drive
Do you know what devices are connected to your network, managed or unmanaged? How do you know if they are secure? With Armis, you can get real-time visibility and control over every agency asset connected to your network. Reserve a spot and earn 4 Continuing Professional Education Credits by taking the Armis platform for a test drive during our in-person class at the Metro Offices in McLean Virginia! The Overview of the Platform Will Focus on:...
VMware Tallahassee Workshop
VMware is coming to Tallahassee! We hope you'll be able to join us at the DoubleTree Hotel on Thursday, April 21st for this must-attend event. VMware subject matter experts will discuss VMware solutions and how they can help you achieve digital transformation without disruption by enabling a digital foundation that delivers any app on any cloud to any device. Agenda 8:00 - 8:45am Registration, Breakfast, and Welcome 8:45 - 9:15am VMware Multi-...
ZeroTrust: The Fundamentals
Zero Trust is a key component of effectively securing government networks, data, and information. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include guidance for zero trust architectures. Zero Trust is not a specific tool, but rather an approach to an agency’s security posture. The right way to approach it quickly b...
Build Fast. Build Securely. Build Trust...
During our webcast, presented by Veracode, join information technology, DevOps and cybersecurity leaders as they discuss the unique challenges agencies face in securing applications. They will explore how agencies can overcome these challenges by using the appropriate technologies and platforms needed to identify, identify and fix vulnerabilities before they adversely affect operations.
Relentless Modernization: The Future of...
Across the nation, counties are sprinting toward the future of digital government. They are transitioning legacy systems to the cloud for dramatic improvements in service quality and efficiency. They're redefining access to public services to simplify experiences, eliminate hassle, and reach the underserved. They are adopting zero trust architectures for enhanced security and privacy while preparing for evolving cyber threats. Identity is the...
SAME NoVA/DC Post: Improving Cybersecur...
Leveraging the SAME Platform to Enhance the Nation’s Cyber Protection Federal cyber security standards are rapidly evolving to respond to the explosive growth of malware, ransomware, and even “killware” attacks spreading across all sectors of society. In response, federal engineers have turned to the AEC industry for collaboration and recommendations to enhance the planning, design, and protection of smart technologies in bui...
Automating Security for the Zero Trust...
The Cybersecurity Executive Order challenges government agencies to take decisive steps to advance toward a Zero Trust Architecture. It’s a daunting task considering the surge in device usage/endpoints that agencies now need to protect. For example, the massive pandemic-prompted shift to remote work. Workers are using personal and/or government issued devices to access important agency information and applications. As cyber threats grow...
Cyber Strategy Session: Naval Supply Sy...
How can the Department of Defense protect networks, systems and data to ensure they’re delivering capability to its intended users? Join moderator Tom Temin and Brian Laird, assistant commander of supply chain technology and systems integration with the Naval Supply Systems Command in this exclusive webinar as they discuss end to end supply chain integration and cybersecurity. IBM Federal’s Chris Egan and the Center for Internet Se...
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.