Register Now: The Role of IAM in Zero Trust
Attendees joined Okta's Field CTO, Public Sector on August 21st for a webinar discussing The Role of IAM in Zero Trust. Zero Trust may be a buzzword for security leaders today, but there’s still a ton of relevancy in core Zero Trust principles. Okta discussed moving beyond the buzzword and repeated messages that fall short in providing a clear and concise path forward. For security practitioners who strongly advocate for Zero Trust, we...
How Infoblox Supports Public Sector Networks
During our 30 minute demo Infoblox-Certified Demo Jock, attendees learned how Infoblox can provide a smarter and more efficient way to manage and protect their network. Our presenter discussed:The impacts on security that arise from evolving IT architecturesHow to leverage your current foundational infrastructures, including DNS, DHCP, and IPAMAdvantages of actionable network intelligence that provides valuable insights on threats and incident...
Evolving Talent Management to Build the...
The skills needed within the federal workforce are evolving, and the way we recruit, train, and support employees must change to support workforce and mission needs. Attendees joined us for a discussion on how to successfully support skills-based hiring and employee career growth by using ServiceNow to capture and maintain skills for re-skilling and up-skilling. The conversation started with ServiceNow experts discussing today’s ever-cha...
SAS Viya on Red Hat OpenShift: Analytic...
Red Hat and SAS hosted a webinar on Thursday, August 22nd, for insights on how their integrated solution helps enterprise IT organizations build and scale analytics on a stable infrastructure and operationalize analytics to get models into production quickly.For more information on Red Hat & SAS's collaboration, please view the resources below:Solutions Brief: Analytics in the Hybrid CloudWebsite: Trusted Decisions With SAS Viya on Red Hat...
Cryptography Simplified: Addressing the...
Cryptography is everywhere. As a key security control that enables privacy, security, and trust in our digital world, it is highly regulated. Yet, after years of being a somewhat sleepy topic in the cybersecurity world, cryptography is now a hot topic in the Public Sector for at least two reasons. First, ongoing migration from FIPS 140-2 to FIPS 140-3 is generating waves of activity to comply with the new NIST standard. As an even larger chall...
Securing the Gateway: Mastering API Sec...
In this session, MuleSoft discussed the importance of securing APIs and shared practical tips and strategies for keeping your APIs safe from cyber threats. Attendees gained insights into industry-leading practices and recommendations to safeguard their APIs from unauthorized access and other potential risks to securely scale their API catalog through standardization, community, and monitoring. watch the on-demand recording to learn about ways...
Value Streams in the Atlassian Ecosystem
Process inefficiencies and communication barriers hinder government agencies from delivering effective public services. As data complexity increases, visibility delays will only worsen. In Atlassian's webinar on August 27th audiences discovered possible delays in their workflows by exploring topics such as:Enhancing operational efficiency with data integrationData security and privacy in public sector analyticsBest suited tools to streamline w...
A Proactive Approach to Defend Your Endpoints
90% of organizations experienced at least one identity-related security incident in the past year. Attackers are increasingly targeting identities and exploiting privileged access to gain a strong position in your environment, bypassing the work of EDR and traditional endpoint defenses. How can security teams take a proactive approach to defending their endpoints? Watch the on-demand recording for a Tech Talk and Live Demo to learn why managin...
Carahsoft's CMMC Webinar Series - CMMC...
Wiz and Carahost hosted a webinar which covered an introduction to Cloud Native Application Protection Platform (CNAPP) and alignment with key CMMC controls. In this webinar we covered:The importance of DIB cybersecurity and safeguarding cloud workloads supporting the DIB, government agencies and warfightersBridging the divide between DIB security professionals and software developersWiz mapping & alignment with the key CMMC controls Minim...
Extending Microsoft Collaboration ABAC...
The defense industrial base (DIB) must meet the critical controls laid out CMMC, NIST, DFARS and other government mandates to bid on defense contracts and protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Watch this on-demand webinar as we explore how extending a Zero Trust approach to file access and sharing using archTIS’s NC Protect helps to ensure compliance with various standards for secure ac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.