Advertisement

You will be redirected to the page you want to view in  seconds.

The Next Chapter in Federal Cybersecurity


Continuous Monitoring & Identity Access for Secure Networks

Two of the most critical initiatives under way to protect sensitive federal and military networks from outside and inside threats are continuous diagnostics and mitigation (CDM) and identity/credential/access management (ICAM). Federal information security professionals are increasingly adopting CDM and ICAM approaches to protect their critical networks as cyberthreats continue to evolve.

Find out more about how CDM and ICAM programs, tools and approaches are being rolled out across defense and civilian networks from top leaders in the information security field.

Free Breakfast Event
June 11th, 2014
7am to 11am
The Ritz-Carlton, Pentagon City, Arlington VA

Keynote Speaker

John Streufert, director of Federal Network Resilience at US Department of Homeland Security.

Panel speakers include:
Deborah Gallagher, Director, Identity Assurance & Trusted Access Division, Office of Governmentwide Policy, GSA, Paul Grant, Strategy Advisor for Cybersecurity, Defense Department, Office of the CIO

Moderators
Steve Watkins, Editor, Federal Times
Barry Rosenberg, Editor, C4ISR & Networks 

Join the discussion. Register today!

Sponsored by

Registration is closed
Industry Circle

Your free source for the latest insights, trends, technology and forward thinking from industry leaders.

Visit industrycircle.com today!

See all Video

Top Video Picks