2,402 webcasts found
+ 54988 past events found
Back to Search Begin New Search Save Search Auto-Notify
Scale and Maintain a Robust and Secure...
Please join F5, AWS, and Smartronix for a webinar where we will review real life best practices to help Public Sector Agencies and Industry Partners stay connected and maintain business continuity under these unusual circumstances. You'll hear how customers are quickly able to scale and maintain a robust and secure telework environment to enable end-users to seamlessly use business and critical applications to maintain productivity and operati...
Add Favorite
7 Strategies For Sub-Contracting With Primes
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Putting MITRE ATT&CK Into Action
Utilizing compromised or fraudulent credentials are a disproportionate hot spot in threat reports. So, it makes sense to look for that in your threat hunting. But where do you start? The answer is MITRE ATT&CK. In this session, Exabeam will close the loop between MITRE ATT&CK TTPs and deep analysis of security events to recognize malicious activity that is difficult to distinguish from innocent day-to-day operations. Join us for this o...
Add Favorite
Validate Cloud Migration Plans with Wor...
Join our Virtana webinar to learn how Cloud Migration Transformation success depends on plans distilled into insights and answers to your questions before, during, and post migration. In this webinar, you will learn how to: Estimate and compare cloud networksExecute full-stack workload performance tests in the cloud De-risk your migration plans by analyzing targeted applications and infrastructure dependenciesCompute storage cost while augment...
Add Favorite
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
The Call for Digital Transformation: Pr...
Carahsoft and Salesforce partner together to provide the best support for the Government Agencies we serve. Salesforce is excited to invite you to our upcoming webinar, The Call for Digital Transformation: Preparing for the "Next Normal" Join us and hear from our Government Digital Transformation experts share their digital transformation framework that will allow you to take actions now that enable your organization to thrive in the next normal.
Add Favorite
New DHS CISA TIC 3.0 Guidance Makes Clo...
Effective immediately, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) issued new TIC 3.0 guidance allowing agencies to roll out zero trust direct-to-cloud connections through cloud service providers (CSPs) that meet CISA guidelines. This new guidance helps agencies avoid the challenges of VPN, which include infrastructure exposure and highly latent traffic paths due to traffic being forced to tr...
Add Favorite
Decision Science for DoD Resourcing ...
The Department of Defense's ability to fully implement the National Defense Strategy depends on success in the domain of resourcing and reform. This includes executing reform priorities quickly while managing costs efficiently; a challenge that has plagued defense leaders who previously relied on outdated, manually compiled, or incomplete data.Join this complimentary webinar for an exclusive analysis detailing how decision science conveys a cl...
Add Favorite
Defending Aganist Ransomware Attacks
Join our Tenable webinar on defending ransomware through effective vulnerability risk management. Implementing an effective ransomware defense strategy is not an impossible task. By ensuring proper implementation of basic cyber hygiene practices across the organization and focusing limited resources first on what matters most in terms of vulnerability remediation, public sector organizations can transform themselves from "soft" to "hard" rans...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
Back to Search Begin New Search