Back to Search Begin New Search Save Search Auto-Notify
Innovative Utilization of Privileged Ac...
As technology rapidly advances, the challenges faced by the US military in securing sensitive information in Dynamic, Distributed, and Interconnected Landscapes (DDIL) have grown exponentially. Protecting critical assets against ever-evolving cyber threats necessitates adopting cutting-edge solutions that enhance security without compromising operational efficiency. In this speaking session, we will delve into the unique and effective applicat...
September 12, 2023
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Tech Talk Tuesday: Protect & Control Ac...
Join this technical product clinic to understand how to better monitor and control access for privileged users, outside vendors, and contractors accessing your OT environments. Leveraging the BeyondTrust Privileged Remote Access (PRA) solution, you can transform your OT security roadmap while seamlessly continuing operations, maintaining agency agility and user accessibility/productivity. We’ll show you a live demo of how PRA can: Elimin...
March 14, 2023
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
BeyondTrust Tech Talk Tuesday: How to P...
100% of world's super computers & more than 90% of all servers in the cloud run on Linux. Without Linux, trains would stop running and planes would stop flying. Google and Amazon run on Linux. These are all considered high value targets to hackers.Join BeyondTrust's technical product clinic to learn about the Linux landscape and how to protect your Linux environment from external attacks and malicious insiders.During the session, Steve Sch...
November 15, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Meeting Mandates with Identity-Driven Z...
Zero Trust is about knowing who is doing what within your network and ensuring that in the event of anomalous activity, you can control and limit threats to the network. Applying the granularity of Privileged Access Management (PAM) to achieve Zero Trust objectives ensures all access is appropriate, managed, and documented, regardless of how the perimeter has been redefined. To stay agile, agencies must leverage Zero Trust principals to never...
September 15, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing the Future: Zero Trust, Identi...
With users and devices now accessing critical information, systems, and applications from anywhere in our distributed digital world, the mindset must be to never trust, always verify, and only allow privileged access when needed or contextual parameters are met. Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. Hear from a distinguished panel of federal cybe...
October 21, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
The American Rescue Plan: Improve Cyber...
Agencies and organizations have suffered a record-breaking number of cyberattacks over the past year. It seems that every week we see a new headline highlighting an attack on our nation’s Critical Infrastructure (CI). SolarWinds, Microsoft Exchange, Florida Water Treatment Plant, and the recent US Gas Pipeline hack to name just a few. Historically, agency cybersecurity budgets have been tight, underfunded, or cut altogether as cyber has...
June 16, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
St. Patty's Day Security "Shake Up" wit...
The current threat landscape has accelerated the need for agencies and organizations to update and secure critical infrastructure. As remote and hybrid workforces expand, there is little question that Privileged Identity Management (PIM) will play an increasingly crucial role in mitigating cyber-attacks. Keeping pace with evolving threats such as Ransomware, Malware, and Data Breaches can be stressful. BeyondTrust and SailPoint invite you to t...
March 17, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Virtual Meditation Class: Minimize the...
Being responsible for Critical Infrastructure Protection is stressful. Join NIST, SailPoint, BeyondTrust for a complimentary virtual event to learn best practices around how to protect Critical Infrastructure with Identity-Centric Security and Privileged Account Management. The event will include a Mind Guided Meditation session, which decreases stress levels by 36% (Duke University). The first rule of designing a secure system is to take a Z...
March 11, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure with...
The identity landscape is more vital and intricate than ever before. Between growing security threats, evolving compliance mandates, and regulations, agencies are facing increased pressure to update and secure their infrastructure and networks. During this webinar, industry experts will share why an integrated identity and access governance management strategy is at the core of a strong cybersecurity program, the framework for developing a suc...
January 27, 2021
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Why Just-in-Time (JIT) Privileged Acces...
A true least-privilege security model requires users, processes, applications, and systems to have just enough rights and access—and for no longer than required—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited and persistent risk part of the equation....
March 17, 2020
Organizer: SIGNAL Media
Location: Webcast
Add Favorite
Back to Search Begin New Search