Federal and private sector cybersecurity experts will be sharing their secrets to success on how Federal agencies can modernize their IT and cybersecurity posture at MeriTalk’s “Accelerating Success: How to Meet the Requirements of the Cybersecurity Executive Order” webinar tomorrow from 10 to 11:30 a.m. EDT.
President Biden’s recent cybersecurity executive order (EO) calls for agencies to modernize their IT infrastructure, and security concepts and practices. Although some agencies are well on their way to meet the new requirements and deadlines, others must act quickly to get on the right path.
Join the webinar on June 22 to hear cyber tips from Matt Hartman, associate director in the cybersecurity division at the Cybersecurity and Infrastructure Security Agency (CISA); Mark Kneidinger, Managing Partner, Kneidinger LLC (Former Federal IT Executive); Gaurav Pal, CEO and founder of stackArmor; Miguel Sian, vice president of technology at Merlin Cyber; Seth Spergel, managing partner at Merlin Ventures; and Bryan Ware, president at Next5 and the former assistant director of cybersecurity for the Department of Homeland Security and CISA.
The panel of experts will cover how agencies can fast-track their move to zero trust architecture, how to overcome the challenges of achieving the EO’s FedRAMP requirements, how to use analytics and automation to improve incident detection and response, and more.
The White House order marks a strong new push for agencies to move to the cloud and zero trust security architectures. The order also puts significant new requirements on Federal agencies to deploy endpoint detection and response technologies on their networks, adhere to a standard cyber incident response playbook, share cyber information with other agencies, and comply with new cybersecurity event log-keeping requirements.
As for the private sector, the order uses the power of the Federal purse to put in place baseline security standards in software sold to the government, and also gives the private sector a seat at the policy table for weighing additional requirements.
Register today to join the discussion on June 22 to hear cybersecurity experts break down the EO’s requirements and learn how to successfully modernize your agency’s IT infrastructure and security concepts and practices.