From Zero Trust to O365: IT Leader's Gu...
For years, financial services organizations have been using mobile devices to enable productivity and improve customer service. With the reliance on the remote workforce over the last year, mobile devices have become even more critical for everything from Zero Trust to providing distributed access to Microsoft O365.But the shift to mobile has also created security and compliance risks that need to be addressed.Tune in for a special fireside c...
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer:
ATARC Location:
Webcast
Empower IOT Devices and Programs With APIs
With 50 billion IOT devices connected in 2020 and machine-to-machine communication growing by 25% annually, the impact of IOT devices and the data being generated from them, is tremendous. For defense agencies and the broader public sector, the growing role of IOT devices also means agencies need to prepare today to maximize the impact of these IOT programs in the future. Join us for this virtual session where we will review how APIs can empow...
Zero Trust for Smartphones
On behalf of Lookout and Carahsoft, we would like to invite you to join our webinar on mobile security for U.S. civilian agencies. Attendees of this webinar will hear the following topics: Colonial Pipeline attack BYOD/Unmanaged Smartphone Protection – Complete security is needed Vulnerable entry points into your infrastructure Software-defined perimeter & Continuous / Conditional access controls Smartphones accessing your VPN? Ranso...
Introducing Next Generation SD-WAN with...
As a result of cloud adoption, and high-performance broadband and infrastructure automation, organizations nationwide have inevitably changed. Now, mobile users directly access the cloud for their app and data needs. It is time to start taking control of your apps and data with the software-defined wide area network (SD-WAN), which promises to enable organizations to seamlessly embrace the benefits of network transformation and remove any limi...
Protecting Bring Your Own (BYO) Mobile...
The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released a practice guide titled Mobile Device Security: Bring Your Own Device. This NIST gui...
June 9, 2021
Organizer:
ATARC Location:
Webcast
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
#1 Way to Reduce Mobile Fraud (That You...
Traditional approaches for fraud prevention rely heavily on user, account, and transaction data. But for transactions that originate from a mobile app, very little is known about the health of the mobile device. This is the most important cause of mobile fraud… one that is a growing problem considering that a significant amount of mobile fraud occurs on the device via malware, bots, and emulators. The only way to combat these sophistic...
Edge Computing – A Must for 5G and IOT...
As the federal government evolves into the “new normal” as a result of COVID-19, Federal data architectures have changed to adapt. Edge computing, alongside 5G and IOT, has created the opportunity for more efficient decisioning at the point of events. Data can be analyzed at near real-time speeds, accelerating decisions that impact critical missions and improve government operations. By collecting and processing data closer to the...
May 20, 2021
Organizer:
ATARC Location:
Webcast
App in a Day - Pragmatic Works
Register today for an all-day interactive training to learn how to create custom business applications without writing code, leveraging the Microsoft Power Platform technologies - Power Apps and Power Automate. App in a Day is designed to accelerate your Power Apps and the rest of the Power Platform stack experience with a comprehensive training in a single day led by a certified Microsoft Partner. The training provides practical hands-on expe...
May 20, 2021
Organizer:
Microsoft Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.