×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Balancing Zero Trust and Operational Expediency for Army

July 9, 2020


Optiv and CyberArk, as security leaders within the DOD, have found there are significant challenges with securing privileged accounts and isolating associated activity within the Army. We have assembled key thought leaders to discuss how to enable zero trust architecture while still facilitating operational expediency for an Army specific webinar. 

Topics include:

  • Protecting privileged accounts and privileged machine identities 
  • Asserting multifactor for non-compliant devices and applications. 
  • Compliance with the RMF framework
  • Automate the management of service account password rotation within STIG requirements
     
Previous Video
Innovation in Government - Fighting Cyber Threats with Identity Management
Innovation in Government - Fighting Cyber Threats with Identity Management

Cyber leaders identify threats with US Federal Government Agencies.

Next Article
How Privileged Access Management Protects State and Local Agencies
How Privileged Access Management Protects State and Local Agencies

State and Local government agencies have become an increasing target of cyber-attackers. Learn how Privileg...