Archived Events
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities.
During the 2024 CyberSmart Federal Day thought leaders from ...
The first pillar of a zero trust architecture is establishing identity for humans and devices alike. Humans, unlike devices, often have strong opinions about what works and what doesn’t, what is easy and what is more difficult than IT professionals realize. Our panel discussed identity, credentialing and access ...
During this webinar, we discussed:
How to empower your security team: Equip your team with seamless access to essential tools, all while safeguarding sensitive data.
Enterprise Shield: Navigate compliance demands and combat cyber threats, ...
As the newest branch of the military, Space Force is quickly building out the infrastructure it needs to be an effective fighting force, which means rich opportunities for government contractors. Given that space is now a major warfare domain, Space Force needs robust command and control systems, resiliency, cybersecurity, ...
In this Power Breakfast, we explored what Space Force is buying and who they are buying it from. We heard from senior leaders who talk about their needs and strategies and how industry can contribute to the success of Space Force.
To learn more, view the
The risk of compromising security and overburdening teams to manage fragmented Identity silos is increasing. What if your organization could ensure security and compliance requirements are met without additional data entry and resources?
Okta integrates Identity Access Management ...
Almost every organization has experienced a serious security breach or has felt the effects of a breach on another organization. To prevent breaches, Department of Energy labs often employ a variety of point solutions, but these aren’t comprehensive or simple to manage solutions. An identity based security strategy is ...
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice ...
AWS subject matter experts discussed AWS solutions and how they can help you achieve digital transformation without disruption by enabling a digital foundation that delivers any app on any cloud to any device.
Attendees explored topics including:
Customer engagement ...
Registration for this event is now closed.
Please visit our website for more information on upcoming events and to view more information on our strategic vendors.