Preparing for the Quantum Future: Advan...
Attendees learned about:Recent advancements in quantum technologies and their implications for national security and federal agency missionsThe impact of quantum computing and sensing breakthroughs on critical infrastructureA policy update on federal guidance for quantum R&D and securitySteps for adopting quantum-safe encryption and achieving crypto-agilityThe role of quantum key distribution (QKD) and other advanced security measures
Navigating the Shift to Post-Quantum En...
As quantum computing advances, federal agencies must proactively transition to quantum-resistant encryption to safeguard sensitive data and meet evolving compliance requirements. This webinar explored how agencies can navigate this critical transformation with confidence. Topics covered in this webinar included:Provide an in-depth look at the key challenges, regulatory mandates and structured approaches necessary for a smooth transitionHighlig...
Building Resiliency Across Your Endpoints
Ransomware attacks often go undetected for months or even years, with attackers escalating privileges before striking. This makes real-time endpoint visibility more crucial than ever, especially in today’s work-from-anywhere environment. Absolute Security and Forescout discussed how their partnership can help you stay ahead of threats. Together, they offer a powerful solution: the Absolute Connector for Forescout eyeSight, which integrat...
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
Defense Ops Debates: Breach Lessons
3 Breaches. 1 Pattern Discord 2023. Signal 2024. Treasury 2024. Three leaks, three different attack paths, and one common blind spot: unsecured mission comms. Picture the next morning's brief: classified slides splashed across social media, an ops channel scraped, and the wrong key in the wrong hands. Now, the timeline moves fast: press, hearings, budget freezes. At 11 AM ET on June 26, a 30-year Navy SEAL and a retired USAF intel chief go fro...
Act Now to Secure Your Agency's Data Fr...
The quantum era is here. Quantum computing is advancing at an extraordinary pace—and with it comes significant risk: rendering today’s cryptographic systems obsolete. Shor's algorithm poses a direct threat to encryption standards like RSA, ECC and DSA. While large-scale quantum computers are not yet available, adversaries can already harvest encrypted data today and decrypt it later, once quantum capabilities mature. This is a clea...
Quantum-Safe & Zero Trust: What Every F...
Federal agencies are racing to modernize cybersecurity infrastructure — not only to prepare for the quantum threat, but also to meet evolving Zero Trust mandates. Join Arqit, Intel & GAI for an exclusive panel discussion on how quantum-safe technologies are enabling federal organizations to build resilient, Zero Trust-aligned environments today. Moderated by Harvey Morrison, CEO and Co-Founder of Marion Square, this discussion highli...
CTO Session: Trusted Data in Motion: Se...
Quantum computing threatens to render today’s encryption obsolete, exposing classified data and undermining national security. Proactive agencies must take the time to tighten their security infrastructure - before quantum arrives. Join this session to explore how U.S. government leaders can mitigate “harvest now, decrypt later” risks and ensure mission continuity with high-speed, post-quantum–ready encryptors that are...
Securing Data-At-Rest from the Enterpri...
As adversaries grow more sophisticated and threats extend from the enterprise data center to the most austere tactical edge, securing data-at-rest has never been more critical. In this webinar, Dominic Perez, CTO of Curtiss-Wright Defense Solutions, and Tom Ricoy, Chief Product and Technology Officer at Cigent, will explore modern approaches to protecting sensitive information across the full mission lifecycle. We will examine how FIPS 140-3 s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.