In this ebook, experts from industry and public sector offer a glimpse at the latest technology developments, share best practice tips and reveal the early value that AI is delivering to agencies across government.
Read More 禄Wayne LeRiche, the federal civilian field chief technology officer and solutions architect for Palo Alto Networks Federal, discusses how secure access service edge sets a framework for agencies to more easily implement a zero trust architecture.
Listen Now 禄From data centers through clouds and out to the edge, 5G networks are facilitating innovation at an unprecedented pace. So the question is: How can we align government and industry objectives and leverage all the resources in play to achieve the goal of open, interoperable and secure 5G networks?
Read More 禄Stephen Kovac, Vice President of Global Government at Zscaler, describes how TIC 3.0 is allowing agencies to extend security to users beyond the network’s perimeter.
Dean Hullings, Global Defense Solutions Strategist at Forescout, examines how identity and access management and training affect mission delivery.
Carahsoft's FedRAMP security and compliance provider partners share their insights on navigating and expediting the process to achieving FedRAMP authority to operate (ATO).
Raymond Pompon, Director at F5 Networks, discusses the complexities of protecting componentized applications and digital services and suggests ways to stay ahead of today’s application threats.
John Hale, the Chief of Cloud Services at the Defense Information Systems Agency, shares his experiences on DoD's shift from defense-in-depth to zero trust strategies to better authenticate mobile devices and support the warfighter.
Morey J. Haber, CTO and CISO of BeyondTrust, explains why privileged access management and cloud-based security are essential for protecting a remote workforce.
Telework is here to stay; Dennis Reilly, Vice President of Public Sector at Gigamon, analyzes how agencies can adapt with pervasive network visibility and analytics.
Matt Kraning, CTO and Co-Founder of Expanse, explains why eliminating blind spots is even more important now that IT resources no longer live in secure enclaves.
An expanding attack surface, massive volumes of event data, and aggressive and capable adversaries are stretching threat detection and response capabilities. Barry Hensley, Chief Threat Intelligence Officer for Secureworks, hones in on security strategies to help organizations scale and be more effective.
New tools and strategies can help agencies protect systems while delivering a better user experience.
Government leaders from the DoD, DoJ, FDIC and Agriculture Department join industry leaders from Radiant Logic, CyberArk, Okta and SailPoint to discuss the role of Identity Management in enabling more efficient access to resources and improving protection and authentication strategies.
As adversaries increasingly target IT administrators, David McNeely, Chief Strategy Officer of Centrify, explores how privileged access management rises to the challenge.
Now that the network perimeter has dissolved, agencies must focus on protecting the user.
The playing field is no longer clearly defined. Chris Usserman, Principal Security Architect at Infoblox, explains how agencies need to revise their playbook.
Tomer Weingarten, Co-Founder and CEO of SentinelOne, discusses how, with the help of AI, cybersecurity can scale up to meet the demands of a changing threat landscape.