Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
How Do You Know Where to Start Your Zer...
Do you have all the parts of zero trust in place to control risk to your crown jewels? If you don't know where to start, you probably need to assess your situation. Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust j...
What's NOT Included in Zero Trust Archi...
Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus th...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.