3rd Annual DoD Zero Trust Symposium
Our third annual virtual symposium features more than 40 speakers from government, industry and academia who will highlight the progress DoD has made in implementing Zero Trust. We will share lessons learned, steps to Zero Trust maturity and ways to modernize Zero Trust implementation. Whether you are just beginning your Zero Trust journey or are well down the path, this symposium will energize and equip you for the road ahead. Don't miss one...
April 2-4, 2025
Organizer:
ATARC Location:
Virtual
CyberScape Summit 2025
CyberScape Summit will bring together federal and industry thought leaders to explore key priorities in cybersecurity to keep you ahead of evolving challenges. Join us to discuss critical infrastructure security, zero trust identity management, data security and more.
CyberSmart 2025: From A to Z
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office. For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to...
April 3, 2025
Organizer:
FedInsider Location:
Reston, VA
CMMC & Securing CUI: Protecting CAD Fil...
Preparing for your CMMC assessment? (1-min. video) Securing Controlled Unclassified Information (CUI) in CAD files is critical for Department of Defense (DoD) contractors. Cybersecurity Maturity Model Certification (CMMC) is finally here, and meeting compliance requirements is no longer optional, it’s essential for accepting DoD contracts in 2025 and beyond. The challenge? Understanding if your CAD files contain or qualifies as CUI. Iden...
April 3, 2025
Organizer:
Secude Location:
Webcast
Securing Workloads in Public Cloud: A 5...
Traditional firewall/VPN-based approaches are inherently not secure and are hard to manage. Zero trust offers IT organizations the opportunity to avoid the pitfalls of extending their on-premises WAN architecture to the cloud. Join our webinar to discover how to transition your cloud security to a modern architecture based on least-privileged access. Attend this webinar, you’ll learn how to:Secure workload-to-internet egress trafficMigra...
April 3, 2025
Organizer:
Zscaler Location:
Webcast
Zero Trust: Improving Your Business Con...
Using a Zero Trust (ZT) architecture for cybersecurity has become essential throughout the public sector, because it both strengthens cyber defenses and enables continuity of operations in the event of an attack. It further benefits an agency by reducing the time lost and lowering the cost of recovery. Working in a ZT-based environment makes the addition of innovative technologies such as cloud computing and AI safer; every new technology intr...
March 31, 2025
Organizer:
FedInsider Location:
Webcast
From AI to Zero Trust: The A-Z of Data...
In today's rapidly evolving digital landscape, government and educational organizations face unprecedented data security challenges. Join Government Technology and NetApp for an insightful webinar where we delve into the current data landscape and explore the critical issues impacting these sectors. You’ll hear firsthand from industry leaders about the challenges they have faced, the innovative solutions they are implementing, and how th...
SNG Live: AI & Automation
The federal government is fully engulfed in an AI and automation revolution. While agencies have been dabbling in applications of machine learning and other AI-related technologies for a decade or more, the arrival of generative AI and its wider mainstream adoption has brought a sense of urgency for the federal government to be a leader in the space. At the same time, in many cases, agencies are applying basic automation to repetitive, mundane...
Extend Zero Trust to your Branch, Facto...
As organizations realize security and operational benefits of protecting users with zero trust principles, they are also achieving value for extended environments like office branches, factories, data centers, and clouds. This session will demonstrate how they adopt and operationalize these locations by extending their zero trust architecture to branch offices, cloud workloads, and OT/IoT devices.
Unlocking Application-Centric Security...
Securing applications in today's dynamic cloud environments demands a new approach. This webinar explores the critical shift towards application-centric security, moving beyond traditional network-centric models to address the unique challenges of cloud-native architectures. We'll delve into how a deep understanding of application behavior and dependencies is essential for robust security posture. Attendees will learn how to leverage threat in...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.