InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Securing Government Contractors under CMMC with Phishing-resistant MFA

Presented by

Bassam Al-Khalidi, Founder & Co-CEO, Axiad; Vieri Tenuta, Global Cybersecurity Offerings Manager—IT/OT Covergence & IoT, Atos

About this talk

Over the past year, complex cyberattacks have skyrocketed—and it is no surprise that the U.S. defense industrial base and government contractors are primary targets. In this context, following the DoD Cybersecurity Maturity Model Certification (CMMC) is now more important than ever. Typically seen as phishing and account takeovers targeting digital identities, these attacks result in data exposure, denial of service, erosion of data integrity, and risk to critical assets. What if the solution was not to make passwords stronger, but rather to remove them entirely? Join Axiad and Atos on April 14th to learn why passwordless phishing-resistant Multi-factor Authentication is the most secure and practical defense. We’ll discuss: 1) General challenges of implementing CMMC identification and authentication controls 2) Actions to validate your workforce and machine identities in compliance with CMMC 3) What to look for in a phishing-resistant Multi-factor Authentication solution
Axiad

Axiad

2221 subscribers28 talks
Trusted Identity. At the speed of now.
Identity teams are drowning in complexity with fragmented tools, siloed data, blind spots, and manual processes. This chaos exposes organizations to breaches, ransomware, data theft, compliance failures, and budget overruns. Axiad tames the human and NHI chaos by automating visibility, intelligence, risk remediation, and lifecycle management. The result is a drastic acceleration of operational efficiency. —Eliminate thousands of work hours from manual processes, —Prioritize resources to make the most impact, —Reduce the risk of breach and the financial implications that come with it
Related topics