Archived Events
Carahsoft and FedInsider invited attendees to a complimentary seminar to hear from state and local IT officials and corporate thought leaders. They discussed the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.
Our panel of ...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities.
During the 2024 CyberSmart Federal Day thought leaders from ...
The first pillar of a zero trust architecture is establishing identity for humans and devices alike. Humans, unlike devices, often have strong opinions about what works and what doesn’t, what is easy and what is more difficult than IT professionals realize. Our panel discussed identity, credentialing and access ...
During this webinar, we discussed:
How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data.
Enterprise Shield: Navigate compliance demands and combat cyber threats, ...
As the newest branch of the military, Space Force is quickly building out the infrastructure it needs to be an effective fighting force, which means rich opportunities for government contractors. Given that space is now a major warfare domain, Space Force needs robust command and control systems, resiliency, cybersecurity, ...
In this Power Breakfast, we explored what Space Force is buying and who they are buying it from. We heard from senior leaders who talk about their needs and strategies and how industry can contribute to the success of Space Force.
To learn more, view the
The risk of compromising security and overburdening teams to manage fragmented Identity silos is increasing. What if your organization could ensure security and compliance requirements are met without additional data entry and resources?
Okta integrates Identity Access Management ...
Almost every organization has experienced a serious security breach or has felt the effects of a breach on another organization. To prevent breaches, Department of Energy labs often employ a variety of point solutions, but these aren’t comprehensive or simple to manage solutions. An identity based security strategy is ...
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice ...
Registration for this event is now closed.
Please visit our website for more information on upcoming events and to view more information on our strategic vendors.