The 1st NIST PQC Standards

Virtual

Eight years ago, the National Institute of Standards and Technology (NIST) initiated a public process to select quantum-resistant public-key cryptographic algorithms for standardization. NIST issued the public call for submissions to the PQC Standardization Process in December 2016 and, after three rounds of evaluation and analysis, selected four algorithms for standardization: CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+. In this talk we will discuss the three current NIST PQC endeavors: drafting standards for the selected algorithms, the remaining algorithms under consideration in the 4th round of evaluation, and the call for additional digital signatures to be considered for future standardization.

Securing the Identity Fabric in the Age of Cloud and Zero Trust

To Be Announced

Securing government agencies against cyber threats is paramount in today’s digital age. This webinar introduces two FedRAMP High Authorized solutions, CyberArk Identity and Endpoint Privilege Manager (EPM), designed to meet and exceed rigorous government security standards. CyberArk Identity simplifies user access with features like Single Sign-On and Multi-Factor Authentication, enhancing security and compliance. Complementing this, EPM protects endpoints by managing user privileges and preventing credential theft, offering an added layer of defense against cyber attacks. This session will showcase how these integrated solutions fortify agency defenses and streamline operational efficiency. Join our panelists as they explore real-life applications of CyberArk’s tools in bolstering government cybersecurity postures and preparing agencies to tackle present and future digital challenges efficiently.

Optimizing Human Performance in Tech Evolution

Virtual

  Presents  Optimizing Human Performance in Tech Evolution In partnership with  May 16, 2024, 1:30-2:30 PM ET 1 CPE Credit Available for this Event***  In today's rapidly evolving technological landscape, government […]

The Role of Deterrence of Insider Risk Series, Part 1 of 3

Virtual

This webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program.

Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.

Zero Trust Lab Phase 2 Demonstration with GuidePoint Security and Technology Partners

Virtual

Join our ATARC Zero Trust Lab Phase 2 Demonstration with GuidePoint Security and Technology Partners. GuidePoint Security experts have been working with industry leading partners in the federal cybersecurity space, leveraging their capabilities in our Zero Trust lab to build integrated solutions for federal use cases. Recognizing that the traditional perimeter model is failing to protect our most valued data, every one of our technology partners brings a solution that integrates with and complements the core tenets of Zero Trust: “Never trust, always verify.”