Back to Search Begin New Search Save Search Auto-Notify
How to Avoid Cracks in the Foundation o...
Most organizations currently employ a patchwork of zero-trust solutions that create cracks in their security foundations. What they actually need is a zero-trust engine to ensure proper standards are met anywhere and at any time. We’ll dive into issues with the current approach to zero trust, how a zero-trust engine solves those issues and the role our platform, TrustedKeep, can play in your zero-trust initiative.
March 27, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Overcoming Stolen Identities: Enabling...
Adversaries increasingly leverage stolen identities to escalate privileges and steal data in the cloud. Over 80% of hacking breaches involved credentials, whether lost or stolen, to impersonate users for further compromise. Join us as we delve into implementing the DoD’s groundbreaking Zero Trust Strategy. This session will explore how the DoD's Zero Trust Strategy strategically integrates identity protection and endpoint detection withi...
January 30, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
A Holistic and Integrated Approach to A...
Over the next four years, the Department of Defense (DoD) will be adopting Zero Trust Architectures based on the guidance set forth in the DoD Zero Trust Capability Execution Roadmap. One of the recent challenges to adoption is fully understanding how different vendor technology solutions can achieve the intended outcome of the DoD Zero Trust capabilities and activities. Additionally, having assurance that solutions selected to fill architectu...
July 27, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
How To Meet Zero Trust and Other High-L...
Achieving zero-trust security is a goal set by the U.S. government. The Executive Order on Improving the Nation’s Cybersecurity requires government agencies to achieve specific zero trust security goals by the end of the 2024 fiscal year. Although Kubernetes was initially designed with basic security capabilities, broad and rapid adoption and an increasingly sophisticated threat landscape have made Kubernetes more vulnerable to attacks....
May 25, 2023
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Snake Oil and Turmoil: The Current Zero...
In 2021, President Joe Biden issued an executive order that mandated agencies to start planning for the migration to a Zero Trust Architecture (ZTA). Since then, hundreds of tech companies have jumped on the zero trust bandwagon. Unfortunately, the market is now crowded with no shortage of overzealous misinformation and hyperbole. It is clear to us that the current zero trust conversation is not resonating with most organizations. For governme...
November 10, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Zero Trust-based Remote Access for Oper...
Zero Trust Network Access (ZTNA) solutions brought simplicity, scalability and more security for IT remote access use cases. This is long overdue for industrial cybersecurity. Traditional IT security approaches such as VPNs and Jump servers as well as IT security oriented ZTNA solutions have several limitations and complexity when it comes to providing streamlined and fully secure remote access for an Operational Technology (OT) environment wh...
October 11, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Native Cryptographic Networking
The internet has evolved from a best-effort IP network for file sharing, email and browsing to a network at the center of a digital revolution in the way we live, work and play. Every sector — from industry and commerce to the federal government — now relies on IP networks for connectivity and everyone expects real-time responsiveness, secure connectivity and 100% reliability. Protecting data and interactions are more important tha...
October 6, 2022
Organizer: AFCEA | Signal Webinar
Location: Webcast
Add Favorite
Juniper Smart Session Router and Missio...
Warfighting increasingly relies on secure undeniable connectivity. As the nation’s adversaries target critical infrastructure, joint forces must be able to continue net-enabled combat and operations in the face of overburdened infrastructure, difficult environments, determined adversaries and insider threats. Juniper’s mission-first network, anchored on the Juniper Session Smart Router, enables organizations to adapt rapidly, provi...
May 5, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Zero Trust: Take Your Cybersecurity Bac...
The recent executive order and Office of Management and Budget memorandum has made it clear that we need to be heading towards a zero-trust architecture. But when we examine the cultural shift required to reach that goal, we may be moving forward but we’re really moving back to the future. Security used to be straightforward. You could only access what you needed to know, when you needed to know it. This was true whether it was a locked...
April 19, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Secure Video Distribution in a Zero Tru...
Securing video distribution systems (VDS) is critical in a zero trust (ZT) world. Modern warfare concepts, such as JADC2, ABMS, project convergence and project over match are all about information dominance. Video and audio data are the virtual eyes and ears of mission critical command and control centers, combat information centers, briefing rooms and operations centers. This webinar is a must for anyone involved in securing VDS platforms. Le...
March 10, 2022
Organizer: AFCEA | Signal Webinar Series
Location: Webcast
Add Favorite
Back to Search Begin New Search