Akamai Technologies

Location
Sunset Hills Rd., Suite 250, Reston,, VA
More Events
Past EventsOn-Demand Events

Events We Are Sponsoring

Three Principles of Security in Uncertain Times

Apr 22, 2026

Virtual / Online

FEDINSIDER

Federal agencies are under relentless pressure to modernize their security posture as they face an onslaught of new, enhanced threats – from hostile nation-states, criminal networks, and hackers determined to stir up trouble.

The path forward starts with three proven principles: Least Privilege Access, which blocks users from gaining entry to data and software they are not allowed to use; Zero Trust architectures, designed to “never trust, always identify;” and microsegmentation, which allows networks to be blockaded into very small sections that can be walled off from the overall network.

Learning Objectives:

  • Learn how to align these three strategies with required mandates
  • Outline a practical roadmap for implementation across your agency’s infrastructure
  • Delineate the ways these approaches strengthen your agency’s cyber defenses from the inside out
View all

Events Where We Are Exhibiting

Texas Department of Information Resources (DIR) Office of the Chief Information Security Officer (OCISO) is proud to announce the 27th Annual Information Security Forum (ISF) on May 20-21, 2026 (Wednesday-Thursday) at the Palmer Events Center in Austin, Texas. As the premier cybersecurity event for Texas state and local government and public education institutions, ISF 2026 brings together decision-makers, IT professionals, and security leaders from across the state for two days of learning, collaboration, and innovation.

 

ISF will feature engaging presentations, panel discussions, and networking opportunities designed to foster collaboration between public-and private-sector security experts.

Jun 2-4, 2026

Baltimore, MD

Registration is not available for TechNet Cyber. Check back in Winter 2025.

 

Adversaries have taken to cyberspace to conduct continuous confrontations. Protecting cyber assets requires more than a single entity, it demands multiple organizations. Join us for this three-day event and interact with IT professionals, hear from experts and develop solutions to ensure technology can connect people to information.

View all