Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Zero Trust in Action: Approaches to Mobile Security and Threat Intelligence

To Be Announced

  Presents Zero Trust in Action: Approaches to Mobile Security and Threat Intelligence In partnership with June 27th, 2024, 1:30-2:30 PM ET  1 CPE Credit Available for this Event***  In today's rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile […]

Cloud Safe Task Force: Delivering the National Cyber Feed

Virtual

Event OverviewThe Cloud Safe Task Force (CSTF) recommends establishing a National Cyber Feed (NCF) —a public-private collaborative effort for comprehensive situational awareness of cyber threatsand responses, fed by real-time security information from major U.S. cloud service providers(CSPs) and used by leading federal cybersecurity organizations including the Office of theNational Cyber Director (ONCD), Office of the […]

Quantum Speaker Series PQC Roadmap

Virtual

Christian Lowry and Dr. Garfield Jones from CISA will discuss the risks and strategic technologies related to post-quantum cryptography and critical infrastructure. Engage in an open Q&A session to delve into emerging technological threats and protective measures. Register now to secure your spot and gain insights into the future of cybersecurity.

Insider Risk Working Group

Virtual

Join ATARC's Insider Risk Working Group bi-weekly, Thursday afternoon meeting. For more information on ATARC Working Groups, contact ATARC's Working Group Manager, Elizabeth Wyckoff, at ewyckoff@atarc.org.

Beyond Traditional Boundaries: Modernizing PIV/CAC Authentication

Virtual

In this webinar, panelists will describe their agency’s progress and challenges in leveraging PIV/CAC and the PKI credentials embedded within as the primary identity authentication mechanism for federal enterprise users. They will discuss the trend of agencies implementing additional (often weaker) authentication techniques to support a variety of use cases that PIV/CAC do not readily support. They will also discuss their agency vision with respect to leveraging FIDO2 credentials, and specifically, Derived FIDO2 Credentials to address multiple authentication use cases and the benefits and challenges of such implementations.