Limited Attendance: Government Only
As agencies venture into the new frontier—cloud filled skies, open landscapes, and perimeter free endpoints—traditional security models no longer work. Agencies are exploring Zero Trust, a security framework based on identity as the foundation. The goal: reduce cyber risk regardless of location, device, and network.
How do leaders in IT ensure the right people have the right level of access? And that access is continuously assessed without impacting the end user? Join MeriTalk and Okta for a government-only, executive breakfast where we’ll explore opportunities and lessons learned from Federal IT leaders working to deploy modern digital infrastructure and mature cyber defenses.
Please contact Kelly Power at email@example.com or (703) 883-9000 ext. 122 if you are interested in attending this discussion. […]
Protecting sensitive data and mitigating risks is no rodeo for Federal IT. But through the CDM program, agencies can address threats in real-time, halt future attacks, and strengthen core cyber capabilities. […]
The National Cybersecurity and Communications Integration Center (NCCIC) continues to chase its mission of reducing cybersecurity risks and overcoming communication challenges. Join this session to hear NCCIC’s Director John Felker discuss how NCCIC is addressing today’s surge of emerging tech implementation, improving risk postures, strengthening overall cyber resiliency, and much more. […]
Compliance and security concerns have slowed cloud adoption, particularly in the Federal corral. But agencies are riding into the great unknown, deploying hybrid cloud environments to enable modern digital services, reduce CapEx, and stay flexible as they meet rapid-fire changes in mission requirements. The real showdown: How do you manage risk and keep data and […]
Disruption, corruption, and dysfunction of our nation’s critical infrastructures and information systems remains a top concern in today’s cyber security dialogue. From transportation and energy, to healthcare and financial services – all must be defended from external and internal threats to ensure data is secure. But the government can’t do it alone. Critical infrastructure is […]