Get More Out Of Your Gigamon: Creating...
Cloud service providers adhere to a shared security responsibility model. This means that customer security teams maintain some responsibilities for security as they move applications, data, containers, and workloads to the cloud, while the provider takes some responsibility, but not all. Defining the line between your responsibilities and those of your providers is imperative for reducing the risk in your public, hybrid, and multi-cloud envir...
Staying a Step Ahead of Bad Actors in S...
Government guidance on cybersecurity is gaining momentum but it's still unable to keep pace with current trends. Changes in how we work (such as remote working) and evolving cyber threats will continue to endanger state, local, tribal, territorial, and educational networks. Today’s threat landscape means that private and public sector organizations can no longer rely on their users or on detection-based security tools to protect their us...
October 25, 2022
Organizer:
FEDINSIDER Location:
Webcast
Imagine Nation ELC 2022
Imagine Nation ELC 2022 brings together the government technology community to discuss the issues facing government and work together to develop practical solutions and innovative strategies. We expect over 650 executives from government and industry to participate in person plus a virtual audience in what has been described as the “best event in the government technology arena.” Seating is somewhat limited this year. The best way...
October 23-25, 2022
Organizer:
ACT-IAC Location:
Hershey, PA
CyberWeek 2022
CYBERSCOOP PRESENTS CYBERWEEK Join over 10,000 influential leaders from the cybersecurity community at CyberWeek, the nation’s largest week-long cybersecurity festival focused on digital threats, best practices and the U.S. government’s work on improving cyberspace. CyberWeek is an annual movement bringing together top C-Suite leaders from major technology companies, state and federal government agencies, and other influential deci...
October 17-21, 2022
Organizer:
CyberScoop Location:
Virtual
CyberTalks 2022
Cybersecurity and digital privacy concerns permeate every aspect of government and industry, driving geopolitical decisions and determining how organizations battle ransomware. Cyber is a critical component in the Ukraine war and informs how the U.S. confronts China's global influence. And the need for digital privacy protections has lawmakers pushing for new technology regulations. In the face of these developments, the brightest minds from a...
October 20, 2022
Organizer:
CyberScoop Location:
Washington, DC
SecureWorld Dallas
For more than 20 years, SecureWorld conferences have been connecting, informing, and developing leaders in cybersecurity--through in-person regional events and interactive online platforms. Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-12 CPE credits through 20+ educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel d...
October 20, 2022
Organizer:
SecureWorld Location:
Plano, TX
2022 ATARC Federal Cloud & Infrastructu...
Leveraging both cloud and hybrid environments has become more prevalent as agencies transform how they manage data and work towards their cloud smart goals. This modernization allows flexibility and supports the operational needs of Federal agencies’ missions. Migrating towards a full cloud environment is not a new topic, as decades of work has been done to ensure that Federal agencies can utilize off-site storage securely, but there can...
October 20, 2022
Organizer:
ATARC Location:
Washington, DC
Zero Trust Implementation Case Study
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include guidance for zero trust architectures. This virtual workshop will focus on actual Zero Trust implementations, and the associated lessons learned.
Zero Trust: The Fundamentals
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
Improving Your Mission Success with Art...
Teaming up with the right partners and solutions can make the mission a success or failure, which is why industry leaders HPE, NVIDIA, and VMware have teamed up to solve some of the biggest challenges with accelerated computing.HPE's secure supply chain ensures that your agency gets the most secure products that are performance optimized for modern artificial intelligence, radar, and modeling applications. Together HPE & NVIDIA provides pr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.