Pour bénéficier d’une expérience Web optimale, utilisez Internet Explorer 11 ou version ultérieure, Chrome, Firefox, ou Safari.

What is Next for Government. A New Approach to Endpoint Management

What is Next for Government. A New Approach to Endpoint Management
a la demande
  • Date enregistrée:Oct. 24, 2018
  • Événement:a la demande
What is Next for Government. A New Approach to Endpoint Management

In the next few years, there will be 25 million network connected devices, all subject to malware attack, and public sector networks are by far the biggest target. The Federal Information Technology Acquisition Reform Act is driving agencies to improve the management of their information assets and, through license compliance and up-to-date security patch adherence, to close the door to cyber-attacks.

This webinar explores best practices in disciplined practices such as patch management and strong network controls that agencies are using for endpoint management.

Ce que vous apprendrez

  • Review GAOs recommendations for implementing sustainable processes for securing network devices, patching vulnerable systems and replacing unsupported software.
  • Delineate methods being used by agencies to keep software continuously updated through an automated process that precludes time-consuming manual software maintenance.
  • Identify methods to employ mobile device management to control and build government bring your own device (BYOD) programs.
  • Explain the benefits of third-party patching, USB port security, and developing a least privileged environment as part of the overall strategy.

Intervenants

Vincent Sritapan, Program Manager, Cyber Security Division, Homeland Security Advanced Research Projects Agency, DHS S&T

Dan Conrad, Federal CTO, Quest Public Sector

Jamie Cerra, Federal Solutions Consultant, Quest Public Sector 

Regarder votre webcast gratuit

Veuillez patienter...

triangle-down check
En téléchargeant, vous vous inscrivez pour recevoir des e-mails marketing de notre part. Pour vous désinscrire, veuillez suivre les instructions figurant dans notre politique de confidentialité.

Site protégé par reCAPTCHA. Consultez les conditions d’utilisation et la politique de confidentialité de Google.