70 past events found
+ 5 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Why a Defense-in-Depth Approach is Now...
While the accelerated transition to all things digital has been needed and welcomed in the Federal Government during the pandemic, it has brought on increasingly difficult security challenges. Distributed workforces, hybrid infrastructures and an abundance of virtual services have led to a rise in cyberattacks on agency data and networks. Now more than ever, government agencies need a quick way to implement a security strategy that is pervasiv...
September 2, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Government Cybersecurity: An Ounce of P...
The White House Executive Order on cybersecurity, issued in May following high-profile ransomware attacks on enterprises as varied as oil pipelines and healthcare, directs the federal government to “improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors.” In response, the National Institute of Standards and Technology has already released guidance outlining security measures for cri...
August 31, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Security as Force Multiplier in the Spr...
It’s time to flip the paradigm…and see IT security teams and protocols as the “cloud accelerators” they are. Progressive security teams see the possibilities, but they need the right strategies, processes, and tools in place to make it happen. A zero-trust mindset is critical, but agencies also need a modern secure operations center (SOC) that acts as a security force multiplier. It’s a central command center tha...
August 5, 2021
Organizer: MeriTalk
Location: Webcast
Add Favorite
Impact of Telework on Fed IT Complexity
The rapid shift to remote work in 2020 resulted in new security and IT priorities, and an unprecedented increase in complexity and visibility challenges. A recent survey of global IT and cybersecurity professionals looked at the impact of those changes and discovered a reported rise in IT, device, and security complexity – and widening visibility gaps. As agencies plan for employees to return to the office, either full-time or part-time,...
June 17, 2021
Organizer: MeriTalk
Location: Webcast
Add Favorite
Cyberattacks 2021: The Landscape of Evo...
The rapid shift to a remote workforce has created an open target for cyber criminals. As employees shifted to working from home, many customer-facing services, such as voter registration, payment options, and license and permit applications, became readily accessible online. The move to digitize systems and services at such a rapid pace means that security sometimes gets left behind. This webinar will review the threats government agencies are...
March 23, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Identity: The Foundation for Zero Trust
As government agencies shifted rapidly to telework, the need to verify the identity of individuals accessing resources from non-government furnished equipment became paramount. Across the country, agencies began to tie identity, credential and access management to their technology modernization plans to insure greater control and visibility as well as easier configuration of resources. This discussion will feature experts in identity and zero...
March 11, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Proofpoint Tech Talk: Reduce Risk with...
With so many employees working remotely during these unprecedented times, a careless mistake or simple lack of caution could cost your organization millions of dollars in damages. Now more than ever before, there’s a stronger need to assess user behavior, determine its impact on risk, and put in place practical steps to prevent malicious attacks. Proofpoint Security Awareness Training addresses these challenges by helping you identify ri...
January 6, 2021
Organizer: Proofpoint
Location: Virtual
Add Favorite
Ransomware: Zero Trust and the Threat Inside
According to Verizon’s 2020 Data Breach Investigative Report, ransomware now represents 27% of all malware attacks. Over 30% of ransomware starts from within. That means that network defenders must consider the possibility that malicious employees could be the origin of an attack. Cyber criminals are stepping up their game by exploiting fear and uncertainty during the pandemic by launching a steadily increasing amount of cyberattacks. Re...
October 21, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevSecOps Easy Modern Secure Applications
Most security breaches occur in the application and not the system. The DevSecOps methodology diminishes security breaches early in the DevOps application lifecycle, but with that, there needs to be a centralized application security solution. The Fortify Security Suite offers various levels of application security that are a part of the CI/CD pipeline code delivery. Join Micro Focus Government Solutions on Wednesday, October 21, during Carah...
October 21, 2020
Organizer: Micro Focus Government Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search