Increasing sophistication among cybercriminals--from insidious stealthy intruders to maddeningly persistent and audacious ransomware criminals--requires solid, robust and modern cybersecurity practices and architecture. Here are four critical areas agencies need to think about in the emerging next-generation of cyber attack.

  • August 26, 2021 | 2:00 PM ET - Protecting Mission Critical Data: Securing Cloud and Cloud Native Environments

    Ongoing IT modernization pressures and 2020’s unexpected shift to remote work leave all agencies needing to accelerate cloud adoption. The Cloud First to Cloud Smart initiative was already urging the transition, but delay is no longer optional. With the federal government projected to spend up to $7 billion dollars on cloud technology and services in the current fiscal year, the stakes are high.

    Yet obstacles to effective adoption remain. Among the most pressing are time to deployment; the need to ensure strong security and privacy protections for government data; and the shortage of skilled workers to manage it all. Those issues are compounded by the complexities of running multi-cloud environments, an approach that most agencies are pursuing.

    During this webcast, attendees will learn from the Department of State and proven industry experts about how to navigate complex multi-cloud security capabilities from Google to AWS, including the ability to continuously scan applications for misconfigurations and threats.

    Featured Speakers Include:
    Brian Merrick, Deputy Manager for the IT Cost Center Working Capital Fund, Department of State (Pending Agency Approval)
    Kurt Greening, Leader Public Sector, Prisma Cloud, Palo Alto Networks

    Register Now

  • September 22, 2021 | 2:00 PM ET - The Future of Threat Detection: How to Get Ahead of Supply Chain Attacks

    Agencies and corporations alike are facing an increase in supply chain attacks. Recently, these cyberattacks have succeeded in exfiltrating an alarming amount of data with extortion fees well beyond typical ransom prices. For agencies in particular, there are a number of critical cybersecurity priorities outlined by the federal government and recommended by vendors alike.

    One key area focuses on improving detection of cybersecurity risks and incidents on government networks. This includes endpoint detection and response (EDR), a key technology that security teams use to track indicators, behaviors and TTPs. The right EDR approach is critical to a cybersecurity strategy, as agencies need a resilient approach to threat detection.

    In the webcast, agency and industry experts will discuss how an extended approach to EDR can serve as the impetus for your teams to get ahead of supply chain attacks. Learn how your organization can easily implement a multipronged approach to threat detection that extends from analyzing low-level techniques and behaviors to other anti-exploitation and protective measures.

    Featured Speakers Include:
    Mike Witt, Associate CIO, Cybersecurity and Privacy, Chief Information Security Officer, National Aeronautics and Space Administration (NASA)
    Bruce Hembree, Field Chief Technology Officer for Cortex, Palo Alto Networks

    Register Now

  • October 21 | 2:00 PM ET - Zero Trust: The Foundation of a Modern Cybersecurity Strategy

    In recent months, Zero Trust has been more firmly cemented into the foundation of federal IT. In May of 2021, The White House issued an Executive Order requiring the federal government to adopt a Zero Trust approach to cybersecurity. The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency is working on a long-term vision for Zero Trust adoption by federal agencies.

    As network boundaries dissolve, Zero Trust offers protection from cyber intruders inside the network. However, implementing the technology and capabilities requires a clear strategy and a plan to get there.

    In this webcast, attendees will learn the importance of a Zero Trust approach within a changing IT environment, insight into how federal agencies will adopt new Zero Trust security requirements and federal agency and industry strategies to get the most out of Zero Trust technologies and capabilities.

    Featured Speaker Includes:
    Ron Ross, Fellow, National Institute of Standards and Technology
    Drew Epperson, Sr. Director, Federal Engineering and Chief Architect, Palo Alto Networks Federal

    Register Now

  • November 17 | 2:00 PM ET - Managing Internet Operations is Not Optional