Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Cohesion out of Chaos: Understanding th...
In late January, a National Security Memorandum was signed to improve the cybersecurity of National Security as required by the Executive Order, 14028. This highlighted the need to increase the sharing of information regarding threats, incidents, and risks across agencies to enable a more effective defense. This memorandum requires the need to develop a framework to coordinate and collaborate on cybersecurity and incident response activities....
Add Favorite
Breaking Down Zero Trust Strategies wit...
Zero trust is at the cornerstone of every agency’s cybersecurity plan. You didn't need the Cybersecurity Executive Order (EO 14028) to mandate it. Yet it raises many questions, despite reams of guidance from NIST, CISA, and OMB. With the recent release of OMB’s Zero Trust Strategy, agencies have a clearer roadmap on the technologies needed and path they need to take. Like any other major transformation, to succeed, each agency is c...
Add Favorite
Meeting the Requirements of the Preside...
President Biden recently signed Executive Order 14028 - "Improving the Nation's Cybersecurity" mandating cybersecurity improvements across the Department of Defense and the intelligence community. With the goal of modernizing cybersecurity defenses and protecting federal networks, this new mandate gives identity teams an aggressive timeline for delivering Zero Trust Architecture and other key initiatives. Join Radiant Logic on Thursday, March...
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
Mission First: DoD and National Securit...
Tune in to be the first to hear our podcast dedicated to covering the latest and greatest in IT advancements - keeping you ahead of the competition. Attendees will hear from Keith Nakasone, former deputy assistant commissioner of acquisition management within the information technology office at the General Services Administration's Federal Acquisition Service and Federal Strategist, VMware and Craig Bowman, Sr. Director - Federal, VMware, who...
Add Favorite
Next Generation Authentication is Coming
The Biden administration's recent Executive Order on Improving the Nation's Cybersecurity in 2021 has a provision to implement Zero Trust architecture across the federal agencies. Zero Trust was already gaining momentum before this Executive Order, but now it is accelerating. Secure authentication is one critical component of this strategy. Current authentication approaches are badly broken - passwords are longer, more complex, harder to remem...
Add Favorite
It's All About the Brand: Keeping Your...
In the 3rd quarter of 2021, the healthcare industry hit an unfortunate milestone of recording at least one ransomware attack against a healthcare facility every single day. The healthcare sector's widespread use of legacy devices and massive amounts of stored Protected Healthcare Information (PHI), makes the industry an environment ripe for threat actors. As the industry emerges from the shadow of the COVID-19 global pandemic, healthcare and p...
Add Favorite
Securing Your Environment with Automation
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn't require a massive acquisition of new technologies.Red Hat has the resources to help you understand current threat environments and why security automation practices are necessar...
Add Favorite
A Cybersecurity Playbook on Maximizing...
In this webinar, featured speakers Fernando Maymi, Dr. Michael Ehrlich, and Maria Thompson will give public sector stakeholders a playbook on securing cloud environments, enabling anonymous threat information-sharing across the public and private sectors, and ways to meet the objectives of the Biden EO on "Improving the Nation's Cybersecurity." You will also learn the importance of removing barriers to sharing threat information and developing...
Add Favorite
Ask Me Anything: STEM Insights & Opport...
Upcoming opportunities for the next generation of scientists, mathematicians, engineers, and technologist to problem solve. The goal of the AFRL STEM Outreach Program is to foster a new generation of scientists, mathematicians, engineers and technologists who will one day discover, and problem solve in the nation’s defense laboratories and other supporting U.S. companies. In order to achieve this goal, there must be a concerted effort to...
Add Favorite
Back to Search Begin New Search