Back to Search Begin New Search Save Search Auto-Notify
Navigating the Road Ahead for Zero Trust
In earlier ATARC Zero Trust sessions, we discussed why Zero Trust is important for securing enterprise resources in a cloud and multi-cloud environment. In this panel discussion, we will dig into practical approaches to executing a Zero Trust modernization plan. Topic experts will cover how priorities and strategies have evolved in the months since the Biden Cybersecurity Executive Order. Join this webinar to hear topics such as: Assessing cur...
September 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
CyberSecurity Virtual Workshop for Publ...
Rapid iterations of DevOps, along with a host of new tools, can make an application security program seem like a square peg in a round hole as enterprises try to push Sec into the middle of DevOps. At the same time, modern applications rely on a more dynamic environment that can introduce new CyberSecurity challenges, particularly as they scale. In this session, we will provide hands-on examples with you in the driver’s seat and explore:...
September 8, 2021
Organizer: GitLab
Location: Webcast
Add Favorite
Why a Defense-in-Depth Approach is Now...
While the accelerated transition to all things digital has been needed and welcomed in the Federal Government during the pandemic, it has brought on increasingly difficult security challenges. Distributed workforces, hybrid infrastructures and an abundance of virtual services have led to a rise in cyberattacks on agency data and networks. Now more than ever, government agencies need a quick way to implement a security strategy that is pervasiv...
September 2, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Government Cybersecurity: An Ounce of P...
The White House Executive Order on cybersecurity, issued in May following high-profile ransomware attacks on enterprises as varied as oil pipelines and healthcare, directs the federal government to “improve its efforts to identify, deter, protect against, detect, and respond to these actions and actors.” In response, the National Institute of Standards and Technology has already released guidance outlining security measures for cri...
August 31, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Security as Force Multiplier in the Spr...
It’s time to flip the paradigm…and see IT security teams and protocols as the “cloud accelerators” they are. Progressive security teams see the possibilities, but they need the right strategies, processes, and tools in place to make it happen. A zero-trust mindset is critical, but agencies also need a modern secure operations center (SOC) that acts as a security force multiplier. It’s a central command center tha...
August 5, 2021
Organizer: MeriTalk
Location: Webcast
Add Favorite
Unified Response: Government & Industry...
The federal government, industry, and the critical infrastructure organizations they run face a common and unprecedented threat -- sophisticated and often crippling cyber-attacks that show no signs of slowing down. It’s a challenge complicated by a significant shortage of skilled cyber-security professionals and varying levels of organizational preparedness. This summer, lawmakers introduced the bipartisan International Cybercrime Preven...
July 28, 2021
Organizer: Oracle One Federal
Location: Webcast
Add Favorite
Gov Cybersecurity Evolution: Where to Next?
Cybersecurity is front-page news, covering everything from the White House’s Cybersecurity Executive Order to the latest ransomware attack. And all that attention means government Chief Information Security Officers are in the hot seat. Agencies must be vigilant about improving cybersecurity more than ever before.Join us and your public sector peers for an online event where you'll learn how governments can rethink cybersecurity policies...
July 27, 2021
Organizer: GovLoop
Location: Webcast
Add Favorite
Securing the Hybrid Cloud: 5G Networks
5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network; security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual...
July 27, 2021
Organizer: Gigamon
Location: Webcast
Add Favorite
Cybersecurity Challenges: Make Your Sec...
Always a top priority in state and local government, the need for better cybersecurity has been magnified even more during the pandemic as opportunistic hackers take advantage of a remote public sector workforce and overwhelmed systems trying to keep pace with heightened citizen demand. Agency leaders trying to boost their cybersecurity posture in this environment face a dual-pronged challenge: a lack of resources and staff to address the evol...
July 22, 2021
Organizer: Government Technology
Location: Webcast
Add Favorite
Cybersecurity and Threat Detection for...
Cyber attack threats continue to accelerate, putting immense pressure on agencies to identify and defeat intrusions. AI/ML and big data analytics are the best tools to defeat these threats. They also require massive IO performance to be effective. Attend this webinar to learn how your organization can: Use visualization tools to identify and eliminate threats Learn why data ingest rates, a metric too often ignored, can have the biggest impact...
July 20, 2021
Organizer: Pavilion Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search