Back to Search Begin New Search Save Search Auto-Notify
Secure Workload Access on Your Journey...
The increasing data breaches and ransomware attacks continue to make front-page headlines. As we all know and accept now, it’s not if a breach will happen but when. The real damage continues to happen when workloads are compromised and attackers are able to move laterally— from web server, to app server to the database server, for example. Securing workloads that make up your applications is critical to the overall Zero Trust Archi...
May 4, 2022
Organizer: VMware
Location: Webcast
Add Favorite
Armis Zero Trust Test Drive
Do you know what devices are connected to your network, managed or unmanaged? How do you know if they are secure? With Armis, you can get real-time visibility and control over every agency asset connected to your network. Reserve a spot and earn 4 Continuing Professional Education Credits by taking the Armis platform for a test drive during our in-person class at the Metro Offices in McLean Virginia! The Overview of the Platform Will Focus on:...
May 3, 2022
Organizer: Armis Government Team at Carahsoft
Location: McLean, VA
Add Favorite
VMware Tallahassee Workshop
VMware is coming to Tallahassee! We hope you'll be able to join us at the DoubleTree Hotel on Thursday, April 21st for this must-attend event. VMware subject matter experts will discuss VMware solutions and how they can help you achieve digital transformation without disruption by enabling a digital foundation that delivers any app on any cloud to any device. Agenda 8:00 - 8:45am Registration, Breakfast, and Welcome 8:45 - 9:15am VMware Multi-...
April 21, 2022
Organizer: VMware Government Team at Carahsoft
Location: Tallahassee, FL
Add Favorite
ZeroTrust: The Fundamentals
Zero Trust is a key component of effectively securing government networks, data, and information. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include guidance for zero trust architectures. Zero Trust is not a specific tool, but rather an approach to an agency’s security posture. The right way to approach it quickly b...
April 21, 2022
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Build Fast. Build Securely. Build Trust...
During our webcast, presented by Veracode, join information technology, DevOps and cybersecurity leaders as they discuss the unique challenges agencies face in securing applications. They will explore how agencies can overcome these challenges by using the appropriate technologies and platforms needed to identify, identify and fix vulnerabilities before they adversely affect operations.
April 21, 2022
Organizer: GovExec Media
Location: Webcast
Add Favorite
Relentless Modernization: The Future of...
Across the nation, counties are sprinting toward the future of digital government. They are transitioning legacy systems to the cloud for dramatic improvements in service quality and efficiency. They're redefining access to public services to simplify experiences, eliminate hassle, and reach the underserved. They are adopting zero trust architectures for enhanced security and privacy while preparing for evolving cyber threats. Identity is the...
April 21, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
SAME NoVA/DC Post: Improving Cybersecur...
Leveraging the SAME Platform to Enhance the Nation’s Cyber Protection Federal cyber security standards are rapidly evolving to respond to the explosive growth of malware, ransomware, and even “killware” attacks spreading across all sectors of society. In response, federal engineers have turned to the AEC industry for collaboration and recommendations to enhance the planning, design, and protection of smart technologies in bui...
April 21, 2022
Organizer: Society of American Military Engineers - NoVA & DC Posts
Location: Washington, DC
Add Favorite
Automating Security for the Zero Trust...
The Cybersecurity Executive Order challenges government agencies to take decisive steps to advance toward a Zero Trust Architecture. It’s a daunting task considering the surge in device usage/endpoints that agencies now need to protect. For example, the massive pandemic-prompted shift to remote work. Workers are using personal and/or government issued devices to access important agency information and applications. As cyber threats grow...
April 20, 2022
Organizer: GovExec Media
Location: Webcast
Add Favorite
Cyber Strategy Session: Naval Supply Sy...
How can the Department of Defense protect networks, systems and data to ensure they’re delivering capability to its intended users? Join moderator Tom Temin and Brian Laird, assistant commander of supply chain technology and systems integration with the Naval Supply Systems Command in this exclusive webinar as they discuss end to end supply chain integration and cybersecurity. IBM Federal’s Chris Egan and the Center for Internet Se...
April 20, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
April 19, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Back to Search Begin New Search