Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department’s complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met.
During this webinar, attendees joined BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, Systems Innovation Scientist, Emerging Technology Directorate, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.
The cybersecurity leaders discussed:
Almost every attack today involves a stolen identity or privilege to execute and initially compromise an environment or move laterally within a network. For those seeking to strengthen your agency’s long-term immunity and resilience against cyber threats, watch the on-demand recording now.
Fill out the form below to view this archived event.