Back to Search Begin New Search Save Search Auto-Notify
Defend 2021: Securing Data, Dashboard & Cloud
The way we work has changed dramatically in the last several months. As everyone has now settled into the new operating environment, agencies must ensure sustained progress towards attainment of Cross Agency Priority (CAP) Goals of the President’s Management Agenda. At the intersection of “IT Modernization” and “Leveraging Data as a Strategic Asset” lies the new security paradigm where access to data to enable the...
December 10, 2020
Organizer: Trustwave Government Team at Carahsoft
Location: Webcast
Add Favorite
GSA Personal Property Disposal Overview
FOR FEDERAL USERS ONLY: FREE training on the Federal Personal Property Management disposal process. Registration is required for this training - each participant will get their own unique entry URL, so you must register to be granted access to the Meeting Space. Participants will receive one and half (1.5) Continuous Learning Point for attending. GSA Meeting Space may not be compatible with everyone's system. Please test your connection early.
December 10, 2020
Organizer: General Services Administration
Location: Virtual
Add Favorite
How to Build an Information Security Pr...
This regional in-person symposium has been updated to a virtual event and is intended for practitioners from the Philadelphia metro area. The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses and create roadmaps to move their programs from current to enhanced states. They establish a culture of continuous improvement and keep their eyes on the horizon a...
December 10, 2020
Organizer: IANS
Location: Webcast
Add Favorite
New Approach to Multi-Factor Authentication
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). Two primary components of multi-factor authentication are "what you have"--such as a securely stored private key--and "what you know", a password to unlock access to the securely-stored credentials. For human users, multi-factor authentication is easil...
December 10, 2020
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Adopt People-Centric Information Protection
In today's current cybersecurity landscape, information protection has become more difficult, and traditional tools aren't well-designed for the modern environment. Data doesn't lose itself. It always involves a person - whether it's a negligent, compromised, or malicious user.A people-centric approach to enterprise DLP can succeed where legacy DLP solutions have failed, and with Proofpoint's people-centric DLP platform, it brings together the...
December 10, 2020
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Splunk Phantom Virtual Workshop
Join us for a Splunk Phantom virtual workshop. This workshop is designed to familiarize participants with how to respond to incidents, manage cases and artifacts, as well as automate your incident response and standard operating procedures.Users will have the opportunity to walk through real-world scenarios and see first-hand how Phantom can be used from the creation of notable events to enriching alerts by automatically gathering data, all th...
December 10, 2020
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Conquering Data Privacy's Biggest Chall...
Addressing data retention is the surest way to mitigate risks and costs of a data breach. With numerous regulations such as GDPR and California’s ballot initiative CCPRA requiring organizations to provide up-to-date and enforced retention schedules, it’s more important than ever that your organization maintains compliant practices to minimize damages. Understand if your organization is at risk and take action now. In this webcast,...
December 10, 2020
Organizer: Exterro
Location: Webcast
Add Favorite
IFRS Institute: Year-End Update
he KPMG IFRS Institute is pleased to announce a webcast on Thursday, December 10, Year End Update. This 60-minute live IFRS webcast summarizes the key 2020 standard-setting developments that may be relevant to IFRS preparers for their annual financial statements. This includes a summary of the IASB’s and IFRS Interpretations Committee’s recent and forthcoming activities. Presented by partners and professionals from KPMG’s Dep...
December 10, 2020
Organizer: KPMG
Location: Webcast
Add Favorite
Securing DevOps with Containers, Encryp...
When bad actors attack, data encryption is the first and the last line of defense. Container image scanning, container runtime stack protection, and perimeter protection are important, but data security should start with protecting the data itself. Join industry experts from Red Hat, Fornetix and Zettaset on December 10th for a technical dive into their integrated solutions that offer enterprise level encryption on a leading hybrid cloud, ente...
December 10, 2020
Organizer: Red Hat Government Team at Carahsoft
Location: Webcast
Add Favorite
Developing an RFP for an ERP System
There are few projects that local governments will take on that reach the size, scope, and complexity of an enterprise resource planning (ERP) implementation. Not only do ERP projects touch just about everything and everyone in the organization, they also can represent significant change for an organization. ERP projects are expensive requiring investments not only in dollars, but in time, creating the expectation that governments will see sig...
December 10, 2020
Organizer: GFOA
Location: Webcast
Add Favorite
Back to Search Begin New Search