Zero Trust Summit 2022
As the nation faces more persistent and sophisticated cyber threats than ever before, federal agencies can no longer take for granted that their systems and applications are secure. With that in mind, the federal government is taking unprecedented measures to protect the highly sensitive information of Americans. Central to the government’s efforts to deter, protect against, detect, and respond to a constant barrage of attacks, the Biden...
April 6, 2022
Organizer:
CyberScoop Location:
Washington, DC
Why Zero Trust Starts With People
It’s become clearer over the last two years that people are the first and last line of defense when it comes to cybersecurity. But how can organizations strike the right balance of cybersecurity, and data and application accessibility as risks and threats change? During this exclusive webinar, cybersecurity leaders will discuss best practices for this people-centric approach to zero trust. Learning objectives: Zero trust in a hybrid and...
Getting to Compliance with the National...
On January 19, 2022, the White House issued National Security Memorandum 8 (NSM) to improve the cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. The memorandum requires National Security Systems to employ network cybersecurity measures equal to or greater than those required of federal civilian networks in Executive Order 14028, issued in May 2021. The NSM builds on several parts of the EO, includi...
April 5, 2022
Organizer:
FEDINSIDER Location:
Webcast
VMware Richmond Day
VMware is coming to Richmond! We hope you'll be able to join us at the Hofheimer Building on Wednesday, March 30th for this must-attend event. VMware subject-matter experts will discuss VMware solutions and how they can help you achieve digital transformation without disruption by enabling a digital foundation that delivers any app on any cloud to any device. Check out our agenda! Don't miss out - register today!
Jumpstart CMMC 2.0 FCI & CUI Protection
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But, for many agencies and DIBs, it's a challenge to implement required information security controls to data in their...
Blueprint for Establishing Zero Trust P...
Everyone is talking about zero trust. Understanding how to prepare and implement a zero-trust framework is not always clear. 70% of organizations are considering a zero-trust framework. There has been a massive shift to remote working along with an increased level of advanced threats to national security. Government agencies and the contractors who serve the agency, often don’t have an effective strategy to manage access to secure data....
Mapping a Zero Trust Journey for the Fe...
Cyberthreats are disrupting our lives now more than ever, and we’ve reached a tipping point. Agencies are turning to Zero Trust for complete network security, but are unsure how to make Zero Trust actionable. Digital transformation is accelerating, with key shifts such as the expanding hybrid workforce and continued migration of applications and data to the cloud. As we make this transformation, information security teams have the opport...
March 24, 2022
Organizer:
ATARC Location:
Webcast
The Zero Trust Standard
Traditional security technologies leave organizations vulnerable to threats, as they do not take into account this new normal of remote work, cloud migration, and scattered IT infrastructure. For this reason, organizations are accelerating their efforts to embrace Zero Trust (ZT), which is rooted in the concept of never trust and always verify. However, many security leaders struggle with where to start their ZT journey and how to ensure succe...
March 24, 2022
Organizer:
Cisco Location:
Webcast
FCW Workshop: Defense Readiness
The nation’s defense systems and capabilities are challenged as never before-- on the ground, in the air, on the seas, in cyberspace and real space. The military must rise to those challenges on all those fronts to ensure the nation is secure. Information technology remains warfighters’ and defenders’ powerful primary tool for their jobs. From cloud computing, cybersecurity and artificial intelligence, to machine learning and...
March 23, 2022
Organizer:
GovExec Location:
Virtual Event, DC
OMB’s Directive on Zero Trust - What Do...
Zero trust is at the cornerstone of every agency’s cybersecurity plan. But, that being said, Cybersecurity Executive Order (EO 14028) raises many questions, despite reams of guidance from the National Institute of Standards and Technology, Cybersecurity and Infrastructure Security Agency, and the White House Office of Management and Budget. Questions like what actually is zero trust? How is it different from previous cyber strategies? Jo...
March 23, 2022
Organizer:
GovLoop Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.