Claudia Hosky
@FedInsider
Publisher of FedInsider, dedicated to bringing insider perspectives, analysis, and training on developments in the government community.
http://t.co/4o00WB7n
ID:24749957
http://www.FedInsider.com 16-03-2009 19:22:29
21,9K Tweets
3,5K Followers
2,8K Following
Bring-your-own-device (BYOD) = 'bring your own danger'
In a recent webinar, Claudia Hosky gathered U.S. Department of Justice & Lookout to explore the challenges & solutions in securing gov employees' cellphones.
GovCIO Media & Research has the highlights: tinyurl.com/2tnbvjh4
Peg Hosky Carahsoft
Join on Claudia Hosky 5/1 as government and industry thought leaders review the DHS approach to zero trust, tool adaptation, and regulatory compliance.
Register free: tinyurl.com/336845wu
#Cybersecurity #ZeroTrust
Peg Hosky Optiv + ClearShark Palo Alto Networks
In Claudia Hosky latest #FATE podcast,we showcase two of the biggest issues agencies face while implementing AI; legacy systems & managing risks, and how leaders are tackling them with U.S. Postal Service U.S. GAO BMC Software
Listen now: tinyurl.com/4rc2ja72
Peg Hosky TD SYNNEX
Join Claudia Hosky on 4/23 as government & industry thought leaders explore national strategies & public-private partnerships to bolster cyber resilience against converging threats.
Register free: tinyurl.com/2p8re9mt
#CriticalInfrastructure
Peg Hosky Carahsoft SecurityScorecard
. 81% of breeches are due to password reuse or being stolen.
Jeremey Benedict, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
To minimize disruption, offer multiple ways to integrate MFA into existing workflows.
Jeremey Benedict, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
People are afraid they will be the one to take down the system.
Meghan Cook, NYS Div. of Homeland Security & Emergency Services
tinyurl.com/yb86h6fj
Okta Peg Hosky Carahsoft Claudia Hosky
Follow the standards that have been established by CISA and NIST when implementing zero trust and MFA.
Jeremey Benedict, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
If your agency has questions, CISA and NIST have a lot of information on MFA.
Meghan Cook, NYS Div. of Homeland Security & Emergency Services
tinyurl.com/yb86h6fj
Okta Peg Hosky Carahsoft Claudia Hosky
Meghan Cook, NYS Div. of Homeland Security & Emergency Services explains the grants available for MFA services and the prerequisites needed to be in place to access the funding.
tinyurl.com/yb86h6fj
Okta Peg Hosky Carahsoft Claudia Hosky
80-99% of attacks are stopped when MFA has been implemented.
Jeremey Benedict, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
The potential cost savings is 1.1 million dollars after implementing MFA.
Jeremey Benedict, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
You need to find the balance between security and usability when designing your agency's MFA.
Jeremey Benedict, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
Meghan Cook, Director, Cyber Incident Response Team (CIRT), Office of Counter Terrorism, NYS Div. of Homeland Security & Emergency Services talks about the challenges that state/local governments face when modernizing legacy infrastructure.
tinyurl.com/yb86h6fj
Okta Peg Hosky Carahsoft Claudia Hosky
Multi-factor authentication is a crucial part of identity, and Identity is critical to everything.
Jeremey Benedict, Senior Solutions Engineer, Okta
tinyurl.com/yb86h6fj
NYS Div. of Homeland Security & Emergency Services Peg Hosky Carahsoft Claudia Hosky
Frequency of training is a best practice for cybersecurity.
Francine Byrne, NYS Bridge Authority
tinyurl.com/yb86h6fj
NY State Board of Elections CrowdStrike Peg Hosky Carahsoft Claudia Hosky
Security is everyone's responsibility.
Deborah Blyth, CrowdStrike talks about strategies organizations can use to enhance cybersecurity awareness and education.
tinyurl.com/yb86h6fj
NYS Bridge Authority NY State Board of Elections Peg Hosky Carahsoft Claudia Hosky
Collaboration and information sharing is very important in cybersecurity.
Deborah Blyth, CrowdStrike
tinyurl.com/yb86h6fj
NYS Bridge Authority NY State Board of Elections Peg Hosky Carahsoft Claudia Hosky