Can we design a more secure government? We’re already well on the way. Recent years brought monumental progress as agencies, and their partners worked tirelessly to design new security frameworks and overhaul existing ones. FedRAMP modernization and CMMC 2.0, emerging zero trust strategies, secure military networking via JADC2, executive orders, and agency roadmaps are among a host of deliberate steps to build resilience into our security DNA.
Join MeriTalk for Cyber Central in Washington, D.C., on October 27 to engage with government and industry leaders as we spotlight critical cybersecurity topics spanning endpoint, cloud, hybrid workforce security, critical infrastructure, secure development, and more. We’ll shine a light on zero trust progress, CMMC compliance, and the holistic efforts both the government and private sector are taking to secure our nation’s most vital assets by design.
Information sharing between government agencies, critical infrastructure operators, and the private sector is critical to our nation’s cybersecurity. Congress took steps to support information sharing by passing the Cyber Incident Reporting for Critical Infrastructure Act, and the Cybersecurity and Infrastructure Security Agency (CISA) is spearheading efforts to collect and share information. However, strengthening security across the ever-expanding digital footprint demands that the public and private sectors move beyond just sharing information. Join keynote speaker Nitin Natarajan, deputy director of CISA, as he discusses why and how cyber defenders must work together on innovative, interoperable solutions that enable a holistic, coordinated threat response.
Remote and hybrid work in Federal agencies is here to stay. To enable it, technology teams walk a tightrope between cybersecurity and access from anywhere. Join our panel discussion as we evaluate the unique security challenges of a hybrid Federal workforce and the solutions that cybersecurity teams and Federal workers need to do their jobs effectively. We’ll cover zero trust architectures, the software supply chain, edge computing, wireless connectivity, and more.