2 past events found
Back to Search Begin New Search Save Search Auto-Notify
Deception Strategy in Zero Trust Environments
A zero trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement. In a zero trust environment, identity stores are a primary attack surface where any compromise of identity can create significant risk. Endpoints and any credentials they contain are also a persistent source of risk; when an adversary escalates privileges a...
March 9, 2023
Organizer: Acalvio Government Team at Carahsoft
Location: Webcast
Add Favorite
Combating Insider Threats & APTs with C...
As we know, it is virtually impossible to keep persistent attackers out of the Department of Defense's (DoD) networks. They will get in. Once within critical networks, these attackers will attempt to move laterally to identify DoD resources for theft and possible destruction. Advanced Cyber Deception gets us into the realm of Proactive Defensive Cyber Operations, by fully integrating ShadowPlex into your existing systems and providing real-tim...
October 15, 2020
Organizer: Acalvio Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search