IT Asset Management in the Era of Zero Trust

September 21, 2022
2:00 PM Webinar

During this exclusive webinar, moderator Scott Maucione and guest Steve Wallace, chief technology officer at the Defense Information Systems Agency will discuss the IT landscape and asset management in the era of zero trust. In addition, Tom Kennedy, vice president at Axonius will provide an industry perspective.

Register Now

GSA’s Hale Points to Zero Trust, Cloud Work for FY2023 Priorities

Lawrence Hale, who recently took over as Acting Deputy Assistant Commissioner for Category Management, Office of Information Technology Category at the General Services Administration’s (GSA) Federal Acquisition Service, explained today that his office’s fiscal year 2023 priorities focus on helping Federal agencies work toward easier cloud service adoption and continued progress in zero trust security migration. 

Read Full Article

CISO Handbook: ICAM and Zero Trust

September 12, 2022
2:00 PM Webinar

During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Ross Foard, ICAM subject matter expert with the Cybersecurity and Infrastructure Security Agency will explore how ICAM factors into zero trust and other modern security practices. In addition, Bryan Murphy, senior director at CyberArk, will provide an industry perspective.

Register Now

NSA, CISA, ODNI Release Software Supply Chain Guidance for Developers

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) released Securing the Software Supply Chain for Developers today. The product is through the Enduring Security Framework (ESF)  — a public-private cross-sector working group led by NSA and CISA that provides cybersecurity guidance addressing high priority threats to the nation’s critical infrastructure. 

Read Full Article

The importance of managing risk in the supply chain

Avetta urges companies to prioritize eliminating cybersecurity risks, which could otherwise have devastating effects on their supply chain. According to Avetta, 85% of companies experience at least one interference in their supply chain every year. From financial instability to data threats, greenhouse gas emissions to incidents on site, supply chains face constant threats.

Full Article

Exiger Selected as Government-Wide Enterprise Supply Chain and Third-Party Risk Management Platform

Risk and compliance specialist, Exiger, has been awarded a contract by the U.S. General Services Administration (GSA) as a trusted partner to deliver a supply chain risk management (SCRM) and third-party risk management (TPRM) enhanced capability made available to the entire U.S. Federal Government. 

The multi-year, $74.5 million, contract award builds on Exiger’s SCRM work with the Department of Defense (DoD) that has been tested and proven across multiple scenarios. GSA will now expand access to Exiger’s SCRM solutions and allow all government agencies to share risk insights and consistently manage supplier risk and health across the U.S. Federal Government enterprise. This enterprise solution is designed to enable significant efficiencies including volume discounts, cross-enterprise data sharing, improved collaboration, and development of supply chain risk mitigation strategies.  

Full Article

C-SCRM – Cyber Supply Chain Risk Management 2022 In Person Dinner Meeting

August 17 @ 5:30 pm – 8:30 pm PDT

Our current supply chain is severely disrupted. Freight in the major ports of Los Angeles, Long Beach, and Oakland are backed up 100 miles out to sea.  The Biden administration issued an executive order in February of 2021 about Cyber Supply Chain Risk Management the same month NISTIR 8276 about C-SCRM was published.  Our supply chain is already shattered, and a cyber-attack could be the straw that breaks the camel’s back.  We will show you how to evaluate all your supply chain risk using the NIST Cybersecurity Framework and Capability Maturity Model (CMMI).  The keys to a successful C-SCRM program are cloud deployment combined with these proven frameworks.  We will show you how we use open-source data, the Salesforce secure cloud, and portals, to automate and deploy an effective C-SCRM program anywhere in the world.

Register Now

CISO Handbook: Securing Identity in a Zero Trust Environment

August 2, 2022

2:00 PM Webinar

During this exclusive CISO Handbook webinar, moderator Justin Doubleday and guest Angelica Phaneuf, chief information security officer at Army Software Factory will break down Army’s digital transformation initiatives in relation to their identity and security strategies. In addition, Matt Tarr, solutions architect at CyberArk, will provide an industry perspective.

For More: https://federalnewsnetwork.com/cme-event/federal-insights/ciso-handbook-securing-identity-in-a-zero-trust-environment/