18 past events found
+ 22 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Helping Customers Protect Against Ident...
Join BeyondTrust and your peers for a Lunch and Learn on April 24 from 12:30-2:30pm ET at the Yards Brewing Company in Philadelphia, Pennsylvania. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern ide...
April 24, 2025
Organizer: BeyondTrust Government Team at Carahsoft
Location: Philadelphia, PA
Add Favorite
BeyondTrust's Securing Paths to Privile...
Join BeyondTrust and your peers for a Lunch and Learn on April 22 from 12:30-2:30pm ET at the Tobacco Road Sports Cafe in Raleigh, North Carolina. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern ide...
April 22, 2025
Organizer: BeyondTrust Government Team at Carahsoft
Location: Raleigh, NC
Add Favorite
How to Provide Zero Trust Secure Access...
Are there barriers to monitoring and auditing your organization's privileged remote access sessions? How are you managing access to secure resources? Join BeyondTrust on March 11 at 1:00pm ET to learn how your team can create a robust, secure, and efficient remote access environment that addresses everyday support needs and critical privileged access requirements. Specifically, our experts will discuss how to:Implement least privilege access f...
March 11, 2025
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Meeting 2027 DoD Zero Trust Mandate: Id...
The looming 2027 DoD Zero Trust mandate is top of mind for many. The strategy outlines, among many capabilities, the requirement for Privileged Access Management (PAM). Most agencies, having submitted at least one rev of their I-Plans, are actively investigating which PAM solutions best fit the needs of their organization. This can be a complex process. Join BeyondTrust and Red River on November 13 for a discussion on how to identify the key t...
November 13, 2024
Organizer: BeyondTrust and Red River
Location: Webcast
Add Favorite
Securing Remote Access in the Cloud
Secure remote access solutions are used by all organizations to securely allow inside IT admins, vendors, developers, and cloud ops engineers to access systems remotely and in compliance with just-in-time access and least privilege principles. As government organizations work to meet cloud computing mandates and modernize, heightened visibility and control are critical to secure sensitive information within a network. Join BeyondTrust, XMS and...
September 17, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
June 18, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Stay One Step Ahead: Enhancing Your Ide...
Attacks on privilege, identities and access are relentless and the stakes are higher than ever. Research conducted by the Identity Defined Security Alliance (IDSA) states that 79% of organizations have had an identity-related breach in the last two years. To combat these threats, it is crucial to adopt a Privileged Access Management strategy. This strategy encompasses a combination of tools, processes, and policies that ensure the right indivi...
January 30, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Innovative Utilization of Privileged Ac...
As technology rapidly advances, the challenges faced by the US military in securing sensitive information in Dynamic, Distributed, and Interconnected Landscapes (DDIL) have grown exponentially. Protecting critical assets against ever-evolving cyber threats necessitates adopting cutting-edge solutions that enhance security without compromising operational efficiency. In this speaking session, we will delve into the unique and effective applicat...
September 12, 2023
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Tech Talk Tuesday: Protect & Control Ac...
Join this technical product clinic to understand how to better monitor and control access for privileged users, outside vendors, and contractors accessing your OT environments. Leveraging the BeyondTrust Privileged Remote Access (PRA) solution, you can transform your OT security roadmap while seamlessly continuing operations, maintaining agency agility and user accessibility/productivity. We’ll show you a live demo of how PRA can: Elimin...
March 14, 2023
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search