×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Balancing Zero Trust and Operational Expediency for Army

July 9, 2020


Optiv and CyberArk, as security leaders within the DOD, have found there are significant challenges with securing privileged accounts and isolating associated activity within the Army. We have assembled key thought leaders to discuss how to enable zero trust architecture while still facilitating operational expediency for an Army specific webinar. 

Topics include:

  • Protecting privileged accounts and privileged machine identities 
  • Asserting multifactor for non-compliant devices and applications. 
  • Compliance with the RMF framework
  • Automate the management of service account password rotation within STIG requirements
     
Previous Video
Innovation in Government - Fighting Cyber Threats with Identity Management
Innovation in Government - Fighting Cyber Threats with Identity Management

Cyber leaders identify threats with US Federal Government Agencies.

Next Article
The Egregious 11: Examining the Top Cloud Computing Threats
The Egregious 11: Examining the Top Cloud Computing Threats

Each year, the Cloud Security Alliance (CSA) releases its “Top Threats to Cloud Computing” study to raise a...