Back to Search Begin New Search Save Search Auto-Notify
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
Taking Zero Trust to the Next Level of...
Cyber threats to federal agencies continue to evolve, requiring equal agility in defending against them. To address the scope of the risk, the White House released Executive Order (EO) 14028 on improving the nation’s cybersecurity in May 2021. It outlined security best practices, including how the federal government must advance toward a zero trust architecture to keep pace with today’s dynamic and increasingly complex cyber threat...
September 13, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Federal Identity Forum and Exposition 2022
Formerly known as the Global Identity Summit, the Federal Identity Forum & Exposition (FedID 22) has been the U.S. federal government’s primary outreach and collaboration-building event with the worldwide identity community since 1995. FedID provides an immersive environment where identity professionals from the federal government, private sector and academia can dedicate three days to strategic planning, information sharing, needs a...
September 6-9, 2022
Organizer: AFCEA
Location: Atlanta, GA
Add Favorite
Critical Infrastructure Cyber Security Summit
The inaugural Critical Infrastructure Cyber Security Summit is a one-of-a-kind conference designed for exclusively invited Executives in charge of the protection of our Nation’s critical infrastructure & data. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emergi...
September 8, 2022
Organizer: Official Cyber Security Summit
Location: Virtual
Add Favorite
Des Moines CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
September 8, 2022
Organizer: FutureCon
Location: Des Moines, IA
Add Favorite
When All Fails: How To Be Cyber Resilient
There is a focus on ensuring an agency’s cybersecurity is as up to date as possible. But, what does one do when all systems put in place to assist in threat attacks break down? Given the high stakes in today’s cyber threat landscape, a good cyber strategy must be based on the assumption that, sooner or later, the agency’s defenses will fail. This assumption places the agency’s one step ahead of the attack: knowing that...
September 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Cybersecurity 2022: Protecting Sensitiv...
During this initial class in the series, we will discuss and provide important guidance for government contractors seeking to ensure compliance with the government’s rapidly expanding cybersecurity requirements. Contractors will learn about new developments under the Biden Administration’s Cybersecurity Executive Order as well as existing statutory and regulatory requirements applicable to contractors. Discussion will cover key age...
September 8, 2022
Organizer: Public Contracting Institute
Location: Virtual
Add Favorite
Industry Profile: Building a Risk Manag...
Changes to the Cybersecurity Maturity Model Certification (CMMC), increased threats and risk to organizational data, third party vendor risk and increased numbers of compliance and framework requirements, makes it challenging to know where to start. Join this webinar to hear directly from one of your peers, Eric Matthews, Senior Strategic Advisor) from Alutiiq, about how he was able to effectively adopt and deploy the Cyturus Cyber Risk Tracke...
September 8, 2022
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
Exploring AI-Powered Automation for IT...
Join moderator Tom Temin and technology experts from civilian and defense agencies in this exclusive two-day webinar as they discuss AI-powered automation for IT. IBM’s Melissa Long Dolson will follow with an industry analysis. Day 1: Civilian Agencies Current state of AI and RPA Best practices for prioritizing AI and RPA Architectural setup for AI and RPA Industry analysis Day 2: Defense Agencies Current state of AI and RPA from a DoD p...
September 7-8, 2022
Organizer: Federal News Network
Location: Webcast
Add Favorite
Think Cloud, Think GSA Part 2
Whether you need assistance with a specific part of the cloud planning process or an end-to-end assisted acquisition, GSA has the flexibility and customizability to get what you need done. Attend this interoffice showcase to understand the expertise of GSA cloud experts, the cloud products and services on offer, and most importantly, what YOUR next actions should be to get the cloud solution needed to achieve your agency’s mission. Acros...
September 7, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Back to Search Begin New Search