This page is actively being updated as we approach the webinar series! Visit back frequently for any changes.

Cybertalks- Predicting Tomorrow’s Ransomware
Speaker: Tony Lee - Vice President,Global Services Technical Operations, BlackBerry

Predicting what new threats could surface today is difficult enough, but how about tomorrow or the next day?  An impossible task, right?  Not necessarily.  Plenty will claim, in order to defend against a threat, one must first see and understand it.  But what if having seen enough threats could allow predicting what the next one will look like, and as a result, defend against it?  Come see how this predictive ability is effectively defending against threats like Darkside, REvil, and Conti today and zero-day threats that will appear tomorrow or well into the future

Active Defense and Compliance with the EO on Improving Cybersecurity
Speaker: Craig Harber -CCSO

Active Defense and Compliance with the EO on Improving Cybersecurity Cyberwarfare is getting harder. If you want the turn the odds in your favor, learn to reshape the battlefield to your strategic advantage using Active Defense solutions. Learn 5 practical changes you can implement that bring you into compliance with the new EO to improve the nation’s cybersecurity and also help security teams find, engage and neutralize adversaries earlier in the attack lifecycle.

Cybertalks- Predicting Tomorrow’s Ransomware
Speaker: George Kamis -CIO, Global Governments & Critical Infrastructure

Zero trust is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated.” – According to NIST Zero Trust Architecture (NIST Special Publication 800-207). However, how can that be achieved?

Join Forcepoint for a pragmatic approach to Zero Trust in a multi-domain environment, and learn about:

  • How to gain knowledge on Verifying Explicity – using multiple attributes (Dynamic and static) to derive confidence levels for contextual access decisions to resources.
  • Detailed blueprints on how to utilize identity, but implement technology that is agnostic to A&A - providing proper access and transfers for multi-domains, remotely, from a single device.
  • How to implement a Zero Trust framework built for continuous monitoring for DCO Enclaves and Cross Enclave collaboration.

Can You Trust Your Zero Trust?
Speaker: Kevin Kuhls - Technical Solutions Architect CCIE (RS, DC) 27908 CISSP 403689

Network visibility and verification are key to ensuring your zero-trust network architecture. Learn how a behaviorally accurate mathematical model, or Digital Twin, enables you to PROVE your network security posture. Determine blast radius of a compromised host, do full endpoint analysis, check your OS vulnerability…Zero-trust, but verify.

Rationalize Legacy and Disparate Navy and Marine IT Systems
Speaker: Tony Carnevale -Customer Engineer

The following relevant capabilities to the Modernize pillar of the DON CIO’s Information Superiority Vision (ISV), along with applicable DoD use-cases, was discussed:

  • Anthos: learn to build and manage modern hybrid and multi-cloud applications without any vendor lock-in.
  • Apigee: enabling an ecosystem with robust and secure API management can spur new innovations for existing Navy and Marine IT ecosystems. Apigee has been constantly at the tip-top of third-party Analyst reviews of the last five years and we’ll show why.


 

BYOAD Strategies for Securing Navy’s Mobile Fleet
Speaker: Victoria Mosby - Federal Sales Engineer

Join Lookout for an educational session that will examine strategies on how to:

  • Secure approved devices with continuous conditional access
  • Gain visibility into applications and data used across network
  • Set policies that meet DISA privacy and compliance standards
  • Protect teleworkers on Commercial Virtual Remote (CVR) from phishing attacks
  • Stay ahead of widespread Zero Trust framework adoption


 

The Way Forward: The IAM Journey to Zero Trust
Speaker: Hansel Oh - Product Marketing, SecurID

The past year’s events accelerated digital transformation and widened the attack surface of organizations, changing what IAM looks like and making zero trust and your approach more critical than ever. In this session you’ll learn how others have adopted zero trust, how to map out your zero trust-centric IAM strategy, and how to identify next steps for moving further down the path to zero trust.


 

Maintaining an Advantage at Sea with Threat Intelligence
Speaker: Aaron Orchard - Sales Engineer

Defending against new and emerging cyber threats requires timely, relevant insights updated in real-time. Recorded Future delivers a comprehensive view of your threat landscape through a combination of high-speed, automated analytics, expert insights from Recorded Future's research group, and advanced querying capabilities. See how the Recorded Future Security Intelligence Platform fuses together billions of entities and delivers original research to dynamically categorize, link, and analyze intelligence with unprecedented speed, arming you with easy-to-consume insights that are easily integrated directly into your existing security tools and workflows

Cyber Resiliency and Zero Trust
Speaker: Tim Brown -CISO & Vice President

Cyberattacks are more frequent, sophisticated, and successful, requiring government agencies to shift security strategies to more secure models like zero trust that take the most restrictive of stances when it comes to providing access. While the concept of zero-trust security has many agencies thinking in terms of identity and cloud services, zero trust must also run on a solid foundation. As part of Carahsoft’s Security on the Seas Webinar Series: IT Solutions for Naval Operations, this session will feature SolarWinds Chief Information Security Officer, Tim Brown, who will discuss best practices for zero-trust security and laying the foundation for success.

Observe & Enforce Zero Trust with Visibility & Analytics (per the DOD Zero Trust Reference Architecture)
Speaker: Chris Peterson - Solutions Architect, Federal

Trend Micro™ Deep Discovery™ is a family of advanced threat protection products that enables you to detect, analyze, and respond to today’s stealthy, targeted attacks. Deep Discovery blends specialized detection engines, custom sandboxing, and global threat intelligence from Trend Micro™ Smart Protection Network™, providing the highest detection rate possible against attacks that are invisible to standard security products. Deployed individually or as an integrated solution, Deep Discovery works with Trend Micro and third-party products to provide advanced threat protection across your organization.