174 past events found
Back to Search Begin New Search Save Search Auto-Notify
Hear From the Authors: Federal Zero Tru...
Among other Federal Government initiatives, the Executive Order 14028 of May 2021, “Improving the Nation’s Cybersecurity” triggered the creation of three documents, critical to helping agencies to adopt zero trust cybersecurity principles and adjust their network architectures accordingly. The Office of Management and Budget (OMB) has released a draft Federal Zero Trust Strategy, to adapt and accelerate civilian agencies...
September 23, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Modernizing Authentication Across Feder...
With NIST 800-63 Digital Identity Guideline guidance on Fast IDentity Online (FIDO) expected in 2022, Federal agencies need to start thinking about modernizing authentication across internal and external applications and infrastructures today. Relying on username and password or mobile-based authentication for use cases such as cloud, citizen-facing digital services, and areas where Personal Identity Verification (PIV) and Common Access Card (...
September 16, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Transforming Agency Security Operations...
Cyberattacks and threats are becoming increasingly sophisticated and dangerous. To keep up with the speed of cybersecurity threats, agencies must implement security operations that include Artificial Intelligence (AI), integration and automation. Artificial Intelligence can help cybersecurity professionals maintain situational awareness of their operating environments. Yet, understanding the available options and practical considerations to im...
September 15, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Why a Defense-in-Depth Approach is Now...
While the accelerated transition to all things digital has been needed and welcomed in the Federal Government during the pandemic, it has brought on increasingly difficult security challenges. Distributed workforces, hybrid infrastructures and an abundance of virtual services have led to a rise in cyberattacks on agency data and networks. Now more than ever, government agencies need a quick way to implement a security strategy that is pervasiv...
September 2, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Why Zero Trust Solutions Are Essential...
Covid-19 uncovered the Government’s need for a secure cloud environment. The migration to the cloud made organizations stop and think about their security posture and their readiness for this change. As more agencies move to cloud infrastructures, challenges arise with control over individual users’ devices. Is your agency implementing a Zero Trust model? Is there a multi-cloud security strategy in place? Tune in as subject matter...
July 29, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Leveraging On Premise Cloud To Protect...
The US Federal Government has the tremendous responsibility of protecting and defending its employees, civilians and the nation’s critical infrastructure and buildings, all the while ensuring mission accomplishment. Federal agencies face complex challenges that include maintaining a safe environment for all citizens and staff, as well as improving operational productivity while remaining compliant to appropriate security standards. With...
July 22, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
ATARC Advancing DevOps Throughout The F...
Collaboration is important in many aspects of the federal government. When collaboration from different agencies and organizations begin to happen, agencies must take a step back and see the best practices for this to take place. How do we harmonize our DevOps/DevSecOps tools/processes/policies across agencies so integration of the end product is seamless? Listen as topic experts dive into the best strategies for harmonizing DevOps and DevSecO...
June 10, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting Bring Your Own (BYO) Mobile...
The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released a practice guide titled Mobile Device Security: Bring Your Own Device. This NIST gui...
June 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search