Archived Events
Managing and delivering data-driven services while meeting public demands is a clear challenge for governments – whether it’s self-service access to data, government transparency, or timely responses to services. But how can you manage and deliver data securely while meeting public ...
On the many paths to Zero Trust, technology investments must complement existing solutions and enhance an organization’s approach to modern security.
With Okta’s latest compliance offering, Okta for US Military (Impact Level 4), and upcoming offering, Okta for Government High (FedRAMP High), one advantage ...
Zero Trust Network Access (ZTNA) initiatives stress the importance of constant assessment of access across the architectural pillars. In practice, this requires an integrated approach to exchanging telemetry between various policy decisions and policy enforcement points to facilitate ...
Identity Matters!CMMC Compliance, Zero Trust Architecture and Vendor Consolidation are major initiatives that require a modernized Identity platform. Gartner consistently ...
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital ...
Evolving your defense agency’s digital engagement may seem overwhelming, but with the help of a secure and powerful platform solution, it doesn’t have to be.
The $1 billion State and Local Cybersecurity Grant Program is the first federal cybersecurity-focused program that provides funds for governments to invest in their cybersecurity infrastructure. This historic funding is an incredible ...
Moving away from inefficient legacy cybersecurity solutions and practices is critical to helping colleges and universities stop student financial aid and identity fraud.Applicant's identities are rarely verified, which can result in colleges and universities issuing funds to bad actors instead of students. What ...
Zero trust is vital for our nation’s cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long ...
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies ...