Archived Events
Moving away from inefficient legacy cybersecurity solutions and practices is critical to helping colleges and universities stop student financial aid and identity fraud.Applicant's identities are rarely verified, which can result in colleges and universities issuing funds to bad actors instead of students. What ...
Zero trust is vital for our nation’s cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long ...
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies ...
Just as technology has been constantly changing and evolving, so has DOD’s strategy for the best way to modernize the tools it provides to the warfighters and their business support services. In 2018, the agency released a strategy to use cloud technology, which has been revised over the intervening years to reflect the ...
Across the nation, counties are sprinting toward the future of digital government.
Zero trust is at the cornerstone of every agency’s cybersecurity plan. You didn't need the Cybersecurity Executive Order (EO 14028) to mandate it. Yet it raises many questions, despite reams of guidance from NIST, CISA, and OMB. With the recent release of OMB’s Zero Trust Strategy, agencies have a clearer roadmap on the ...
In this session, Chad Peterson, Senior Sales Engineer at Okta, discussed how to retire costly legacy infrastructure and complex code development by modernizing your agency's IT platform with a modern identity infrastructure.