Back to Search Begin New Search Save Search Auto-Notify
Zeroing in on Identity: 2022 Federal Ze...
While agencies strive to meet zero trust requirements, what roadblocks do they face? Which of OMB’s zero trust security goals (identity, devices, networks, applications, and data) are taking precedence and which are falling behind? MeriTalk and Merlin Cyber surveyed 150 Federal cybersecurity executives to explore momentum, priorities, and challenges around the evolution to zero trust. In part one of a four-part webinar series, MeriTalk w...
February 16, 2022
Organizer: MeriTalk
Location: Webcast
Add Favorite
Executive Orders, Memos and Mandates, Oh My!
The Biden Executive Order 14028, released May of 2021, required that CISA and OMB expand on the White House's new cybersecurity requirements. Over the last several months, CISA and OMB issued additional requirements and timelines to memos and reference architectures consistent with the Executive Order that Federal Agencies must meet to support the mission of Improving the Nation's Cybersecurity. Join GuidePoint Security on Thursday, February 1...
February 10, 2022
Organizer: GuidePoint Security LLC
Location: Webcast
Add Favorite
Accelerate Your Journey to Zero Trust w...
Registration is now closed Zero Trust is not a technology or product to be bought and deployed – rather, it is a transformation of operational framework to incorporate the highest security measures in modern network environments. At its core, Zero Trust is a commitment to a risk-based approach across end-users, networks, data, devices, and much more. VMware offers the strongest Zero Trust security capabilities on the market and has exper...
February 9, 2022
Organizer: VMware Government Team at Carahsoft
Location: Albuquerque, NM
Add Favorite
Extended Detection and Response: The Sw...
If you had to choose between a standard utility knife and a Swiss Army knife, which one would you pick? Most people would choose the latter because it can do more. Likewise, extended detection and response (XDR) offers the same capabilities as endpoint detection and response (EDR), plus so much more. XDR doesn’t stop at the endpoint. It provides a holistic view across networks, cloud workloads, servers, endpoints and more. This visibilit...
February 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Assessing the State of the (IT) Union:...
On the evening of Jan. 20, 2022, President Biden will make his first State of the Union address – a good time to assess the condition of federal IT, particularly with regard to policy prescriptions that agencies must adopt, such as zero trust, to achieve greater cyber resilience. The foundation of the May 2021 Cybersecurity Executive Order is the directive for agencies to implement a zero trust architecture to strengthen their cyber defe...
January 25, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Securing the Future: Zero Trust and Eme...
The continued use of remote and hybrid workforces has changed not just daily workplace paradigms, but also how we protect our systems from malicious actors. Security approaches are being innovated to address this new landscape with new tools and philosophies. Agencies are increasingly looking at everything from Zero Trust Architectures to FedRamp Certification for the best ways to ensure continued protection and success in their missions. In t...
January 20, 2022
Organizer: GovExec Media
Location: Webcast
Add Favorite
Part 1: Protecting Against Advanced Thr...
Join OPSWAT on January 20th at 2:00pm ET for part 1 of this exclusive webinar series. During this series, we will focus on utilizing next-generation sandbox technologies to build your zero trust strategy for both IT and OT environments. This webinar will feature guest speakers Bob Gourley, former CTO of the DIA, and Bob Flores, former CTO of the CIA. Gourley and Flores are frequently called upon to build improvement plans for large commercial...
January 20, 2022
Organizer: OPSWAT Government Team at Carahsoft
Location: Webcast
Add Favorite
Panel Discussion | Partnering to Achiev...
Zero Trust is not simply a different type of security technology or architecture; it is a methodology that provides a more comprehensive, dynamic and integrated approach to security. Cloud computing and software defined approaches along with maturity and interoperability across the technology ecosystem means Zero Trust is now more achievable than ever before. But Zero Trust also is not a product bought from a single vendor. Rather, maturity co...
January 19, 2022
Organizer: Splunk
Location: Webcast
Add Favorite
Accelerate Your Journey to Zero Trust w...
Zero Trust is not a technology or product to be bought and deployed – rather, it is a transformation of operational framework to incorporate the highest security measures in modern network environments. At its core, Zero Trust is a commitment to a risk-based approach across end-users, networks, data, devices, and much more. VMware offers the strongest Zero Trust security capabilities on the market and has experts on hand to transform you...
January 19, 2022
Organizer: VMware Government Team at Carahsoft
Location: Colorado Springs, CO
Add Favorite
Building a Flexible Framework for Imple...
It is easy to say, “Never trust – always verify.” It is much harder to put that philosophy into practice, even though zero trust is the foundation of the Cybersecurity Executive Order released in May. It is unprecedented for an EO to be so specific in its cybersecurity directives. Despite the EO, there is no single way to approach zero trust implementation. The National Security Agency released some guidance in February about...
December 16, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search