Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?
During this webinar, topic experts and thought leaders discussed how to manage identity to ensure agencies are aligned with recent policies such as Biden’s Executive Order on Cybersecurity and the NIST 800-207 Zero Trust Architecture.
Featured Speakers:
Renata Spinks Cyber Technology Officer, United States Marine Corps Forces Cyberspace Command (invited) | Robert Hankinson Director of Information Technology Infrastructure, United States Department of State (pending approval) |
Ross Foard Senior Engineer and ICAM SME, Cybersecurity and Infrastructure Security Agency | Trafenia Salzman Security Architect, United States Small Business Administration (invited) |
Wenchun Jiang Chief Information Security Officer, Federal Election Commission (invited) | Kenneth Myers Chief Federal ICAM Architect,General Services Administration(pending approval) |
Josh Brodbent Director, Public Sector Solutions Engineering, BeyondTrust | Frank Briguglio Global Public Sector Strategist, SailPoint |
Event Moderator: Tom Suder, Founder and CEO, ATARC
An information-sharing event focused on effective Identity Security models and Privileged Access Management controls.
Watch the on-demand recording!
Fill out the form below to view this archived event.