The Fundamentals of Protecting your Paths to Privilege

Virtual

Despite the long standing principles of Least-Privilege and Privilege Access Management (PAM), 90% of organizations experienced at least one identity-related security incident in the past year. Even with the number of security tools in place, attackers are outflanking them through unidentified attack paths. And AI is accelerating and uncovering paths to privilege faster than we’ve ever seen. In this webinar, our panelists will discuss how many organizations still maintain legacy identity platforms and applications, the types of privilege abuse that can (and does) occur and finally the fundamentals for protecting your paths to privilege and why it requires an identity-centric approach.

ATARC’s Federal Health IT Summit

Carahsoft Conference & Collaboration Center 11493 Sunset Hills Rd, Reston, VA, United States

6.0 CPE Credits Available for this Event***Registration   |    Breakfast Opening RemarksBridging the Gap: Advancing Diversity and Mental Health Equity As diversity and inclusion become essential to driving innovation, federal […]

USDA Stratus Launch Event

USDA 1400 Independence Ave SW #5071, Washington, DC 20250, United States

A forum for the USDA, our Federal partners, and Industry to collaborate and build thefuture of Cloud through the STRATUS Program.STRATUS was conceived by USDA for USDA to address expiring […]

Advancing the Mission: AI in Government Summit

AWS Aurora 1770 Crystal Drive, Arlington,, VA, United States

   Registration   |    BreakfastLeveraging Retrieval Augmented Generation (RAG) for Trusted ApplicationsGen AI as a Tool for Mission EnablementEnsuring effective mission enablement through Generative AI is crucial in today's fast-evolving […]

Assessing the Benefits and Risks of Quantum Computers

Virtual

Quantum computing is an emerging technology with potentially far-reaching implications for national prosperity and security. The maturity of currently-available quantum computers is not yet at a level such that they can be used in production for large-scale, industrially-relevant problems, and they are not believed to currently pose security risks. However, four trends — new algorithms, error mitigation, circuit knitting, and the commercial exploration of business-relevant quantum applications — may enable useful and practical quantum computing in the near future. At the same time, these trends are unlikely to affect the feasibility of using quantum computers for cryptanalysis. Given this, there is a credible expectation that quantum computers will be capable of performing computations which are economically-impactful before they will be capable of performing ones which are cryptographically-relevant.