Para tener la mejor experiencia web, use IE11+, Chrome, Firefox o Safari.

What is Next for Government. A New Approach to Endpoint Management

What is Next for Government. A New Approach to Endpoint Management
A pedido
  • Fecha de grabación:Oct. 24, 2018
  • Evento:A pedido
What is Next for Government. A New Approach to Endpoint Management

In the next few years, there will be 25 million network connected devices, all subject to malware attack, and public sector networks are by far the biggest target. The Federal Information Technology Acquisition Reform Act is driving agencies to improve the management of their information assets and, through license compliance and up-to-date security patch adherence, to close the door to cyber-attacks.

This webinar explores best practices in disciplined practices such as patch management and strong network controls that agencies are using for endpoint management.

Lo que aprenderá

  • Review GAOs recommendations for implementing sustainable processes for securing network devices, patching vulnerable systems and replacing unsupported software.
  • Delineate methods being used by agencies to keep software continuously updated through an automated process that precludes time-consuming manual software maintenance.
  • Identify methods to employ mobile device management to control and build government bring your own device (BYOD) programs.
  • Explain the benefits of third-party patching, USB port security, and developing a least privileged environment as part of the overall strategy.

Oradores

Vincent Sritapan, Program Manager, Cyber Security Division, Homeland Security Advanced Research Projects Agency, DHS S&T

Dan Conrad, Federal CTO, Quest Public Sector

Jamie Cerra, Federal Solutions Consultant, Quest Public Sector 

Vea su transmisión vía Internet

Espere...

triangle-down check
Al realizar la descarga, se registra para recibir un correo electrónico de marketing de parte nuestra. Puede optar por no recibir ningún correo electrónico siguiendo las pasos que se detallan en nuestra Política de privacidad.

reCAPTCHA protege este sitio. Consulte la Política de privacidad de Google y los Términos de uso.