Back to Search Begin New Search Save Search Auto-Notify
Digital Forensics for National Security...
Defense Strategies Institute is proud to announce the 5th Annual Digital Forensics for National Security Symposium on May 15-16th, 2024. The Digital Forensics Symposium will bring together IC, DoD, federal government, industry, and academia in a town hall style forum to collaborate across the community on ways to advance digital forensics solutions to support criminal investigations, crime prevention, and threat mitigation efforts.The symposiu...
May 15-16, 2024
Organizer: Defense Strategies Institute
Location: National Harbor, MD
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Identity Managment Symposium
DSI’s 10th Annual Identity Management Symposium will address the importance of developments across the biometric and identity management sectors as they relate to national security. Biometrics and identity management systems stand as crucial pillars in fortifying the security infrastructure of the U.S. federal government. As technology evolves, the need to safeguard sensitive information and maintain the integrity of federal accounts bec...
April 10-11, 2024
Organizer: Defense Strategies Institute
Location: National Harbor, MD
Add Favorite
Zero Trust: Protecting Both Data & Identity
Adopting a zero trust policy has become imperative for agencies aiming to safeguard their digital assets against increasingly sophisticated threats. It represents a true paradigm shift, away from traditional perimeter-based security models to a more dynamic, trust-never always-verify approach. One critical part of implementing zero trust is managing digital identity – ensuring that access to resources is securely managed and continuously...
March 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
ATARC Federal Zero Trust Summit 2024
In an era of escalating cyber threats, a proactive approach is essential. This panel will highlight how zero trust principles can be augmented by comprehensive visibility and advanced analytics. By monitoring user behaviors, network traffic, and device activities, federal agencies can gain real-time insights into potential threats, swiftly detecting anomalies and unauthorized activities. This approach empowers agencies to respond promptly to s...
March 13, 2024
Organizer: ATARC
Location: Washington, DC
Add Favorite
Enhancing the Resiliency and Security o...
Join Salesforce and Own Company as we discuss what the year ahead looks like for the U.S. Federal Government. In 2024, current Federal agencies using Salesforce Government Cloud will be making the move to Hyperforce. This migration will help agencies incur compliance, meet local regulations for data storage, and increase security. Ahead of this migration, there are many recommended best practices your org can enact and have in place to ensure...
March 13, 2024
Organizer: Own Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing the Cyber/Software Supply Chain
Executive Order 14028 (Improving the Nation’s Cybersecurity) established new requirements to secure the federal government’s software supply chain. The requirements involved systematic reviews, process improvements, and security standards for both software suppliers and developers, in addition to customers who acquire software for the federal government. The software supply chain is only truly secure when all entities throughout t...
February 29, 2024
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Applying Zero Trust Architecture in Sta...
State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies’ IT systems and technical support staff. Rather than using a “hub-and-spoke” method of connecting employees to servers, data, applications, and each other – where cybersecurity focused on firewalls around the perimeter ...
February 13, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberSmart 2024: Facing a Rapidly Chang...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance,...
February 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search