Upcoming Events
Join this upcoming webinar to explore practical, grant-ready identity security strategies designed for State, Local, Tribal and Territorial (SLTT) organizations. Learn how to strengthen governance, improve grant ...
Attendees joined Federal News Network on October 1–2 for a free virtual event exploring how federal leaders are adapting to evolving threats, integrating new technologies, and strengthening cyber resilience. They heard from senior cyber policy officials, agency leaders, and industry experts on priorities like ...
Archived Events
Attendees walked away with:
Mission-ready insights by aligning real-world use cases with proven cybersecurity solutions
Tailored recommendations from vendors that spoke directly to ongoing initiatives and priorities
A streamlined environment to ...
During this webinar, we explored how to detect and prevent threats like synthetic identities, account takeovers and impersonation.
Attendees were able to:
This session highlighted:
Seamless identity orchestration across hybrid and disconnected environments
CAC-based authentication and digital signature enforcement ...
Attendees of this gained insight into:
The Bubble Model: Learned how the bubble model creates resilient, self-contained identity environments that operate independently of central authorities, ensuring secure operations even in high-risk scenarios by isolating identities & ...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication ...
Attendees of this webinar learned:
Best practices for efficient integration and delivery of identity and security solutions for Zero Trust Architecture
Why a best-in-class approach is required to drive real identity security value
How to address ...
Navigating the complexities of Identity, Credential, and Access Management (ICAM) can feel like a maze of acronyms – ABAC, PBAC, CBAC, oh my!
Attendees joined for an insightful webinar where Bryan Rosensteel, Ping Identity's US Federal CTO, unravelled the intricacies of ICAM and shed light on fine-grained ...
Attendees learned how combining these trusted tools makes it easy to:
Deliver the promised benefits of the last decade and enable the Zero Trust pillars
Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives
Reduce the risk of data breaches ...