Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

BeyondTrust-microsite.png
BeyondTrust

BeyondTrust & SailPoint ATARC Webinar: Zero Trust


Event Date: June 24, 2021
Hosted By: BeyondTrust, SailPoint, & ATARC

A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best practices for Privileged Access Management controls?

During this webinar, topic experts and thought leaders discussed how to manage identity to ensure agencies are aligned with recent policies such as Biden’s Executive Order on Cybersecurity and the NIST 800-207 Zero Trust Architecture.


Featured Speakers:

Renata Spinks

Cyber Technology Officer, United States Marine Corps Forces Cyberspace Command (invited)  

Robert Hankinson

Director of Information Technology Infrastructure, United States Department of State (pending approval)

Ross Foard

Senior Engineer and ICAM SME, Cybersecurity and Infrastructure Security Agency          

Trafenia Salzman

Security Architect, United States Small Business Administration (invited)           

Wenchun Jiang

Chief Information Security Officer, Federal Election Commission (invited)        

Kenneth Myers

Chief Federal ICAM Architect,General Services Administration(pending approval)           

Josh Brodbent

Director, Public Sector Solutions Engineering, BeyondTrust        

Frank Briguglio

Global Public Sector Strategist, SailPoint


Event Moderator: Tom Suder, Founder and CEO, ATARC


An information-sharing event focused on effective Identity Security models and Privileged Access Management controls.

Watch the on-demand recording!


Fill out the form below to view this archived event.


Resources


Quantum-Resilient Cybersecurity
Presentation

Quantum-Resilient Cybersecurity

The quantum threat landscape is vast and ever-changing, posing threats to the security of sensitive information. Download this QuSecure presentation to explore how quantum computing can impact a variety of industries and how the QuProtect™ solution works against it.


Fill out the form below to view this Resource.