Achieving Zero-Trust Architecture: Cult...
The implementation of zero-trust architecture (ZTA) requires a fundamental cultural change among and within different government agencies. “Never trust … Always verify” is a profound pivot from the current mindset inside the federal government. Unfortunately, as is well documented, the public sector accepts change slowly, which is a problem in this era of rapid technological change. Notably, adversaries of the United States...
Overcoming Stolen Identities: Enabling...
Adversaries increasingly leverage stolen identities to escalate privileges and steal data in the cloud. Over 80% of hacking breaches involved credentials, whether lost or stolen, to impersonate users for further compromise. Join us as we delve into implementing the DoD’s groundbreaking Zero Trust Strategy. This session will explore how the DoD's Zero Trust Strategy strategically integrates identity protection and endpoint detection withi...
Next-Gen Defense: Unleashing the Power...
Leveraging AI and implementing zero-trust security are critical parts of the movement to modernize the U.S. military. Kubernetes experts will provide insights and besThe U.S. Department of Defense’s Software Modernization Strategy calls for gaining a competitive advantage to achieve strategic and tactical superiority. Leveraging artificial intelligence (AI) and implementing zero-trust security are critical parts of the movement to modern...
Acquiring and Developing the Army's Cyb...
Take a tour of the Army's Cyber Corps operations in cyberspace and what it takes to build a specialized workforce. The military occupation specialties (MOSs) within CMF 17 are unique and more technical than most of the Army's other MOSs.Learn about the ongoing efforts to recruit the necessary talent into the Cyber Corps to be the most effective and dominating cyber force in the world. Recruitment is straightforward and one of the Army's big fo...
Utilizing Data Literacy in the Military
Data literacy plays a vital role in the modern military, enabling effective decision-making, enhanced operational efficiency and improved strategic planning. By leveraging data effectively, the military can gain valuable insights, optimize resources and use drive data-driven decisions that allow commanders to make decisions in near real-time.
Making the Case for a Federal Bureau of...
There is a clear and compelling need for a repository of systematically collected and analyzed data on cyber threat activity and of the relative effectiveness of different measures of cybersecurity, resilience and recovery. At the highest level, defense and effective deterrence of adversary activity in cyberspace requires data that is accurate, timely and pertinent to the policy and operational decisions made by government and industry executi...
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
Time To Modernize Enterprise Cyber Thre...
The term “cyber threat hunting” has taken on several meanings over the last few years. When asked the question “What does cyber threat hunting mean to you?” the answer you receive can vary widely depending on the perspective and/or managerial or operational role within a cyber team. With so many sources of cyber threat intelligence, both commercial and opensource, including advances in automation, specifically AI/ML and...
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
Securing the Software Supply Chain from...
Securing the software supply chain is mission critical to the federal government, particularly after the 2020 SolarWinds breach and the increasing frequency of attacks. Given Cybersecurity Executive Order 14028, the ongoing risk of software supply chain attacks, and the criticality of software to daily operations, balancing security with innovation is essential to accelerating government missions. Agencies must ensure software is free of vulne...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.