Back to Search Begin New Search Save Search Auto-Notify
Evolving Digital Engagement with Okta a...
Evolving your defense agency’s digital engagement may seem overwhelming, but with the help of a secure and powerful platform solution, it doesn’t have to be. Okta and Salesforce are working together to ensure agency workforces are safely authenticated onto one platform that helps remove friction and increase innovation. Join Okta, Salesforce, and Carahsoft for a webinar on October 19th to learn how this approach lets DoD agencies:...
October 19, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
Managing Data Protection and Recovery C...
The challenges and complexity of maintaining a “ready-to-recover” posture grow exponentially as the volume of data, the number of locations and numbers of workloads continue to skyrocket. IT leaders must meet the expectations of their organization in terms of up time and availability as well as managing and predicting costs. Tune into this panel as topic experts discuss how to manage data and applications at scale at the right econ...
October 13, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Steps for Acquiring and Implementing AI...
We are quickly approaching the two year anniversary of the National AI Initiative Act becoming a law, which created a task force committee to assist the state of AI in the Federal government. The use of AI in the government helps accelerate a lot of processes but it requires extensive work, research, and resources in its implementation. In addition, it requires a uniformed language and understanding of what AI can do for your organization. Iss...
October 6, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Addressing the Cyber Security Prioritie...
Current guidance has laid out the cybersecurity priorities that federal agencies should adhere to for the upcoming fiscal year 2024 budget cycle. Civilian agencies will need to focus on making investments within the three cyber investment priority areas: Strengthening the Foundations of Our Digitally-Enabled Future, Deepening Cross-Sector Collaboration in Defense of Critical Infrastructure, and Improving the Defense and Resilience of Governmen...
September 29, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
How To Be Prepared Against Evolving Sof...
Combating modern-day software supply chain attacks is significantly more complicated than in the past. Adversaries are getting craftier and are no longer waiting to exploit publicly disclosed vulnerabilities to launch a cyberattack. By shifting their focus “upstream,” adversaries can infect a single open source component, which will then be distributed “downstream” using legitimate software workflows and update mechanis...
September 22, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Responsible AI & Speed to Mission: How...
With rapidly changing priorities, new threats, and an increasingly high expectation from citizens for digital services, government agencies must discover new ways to streamline their delivery of digital applications and systems. On top of that, they need to ensure that data and AI are being used responsibly. Responsible AI ensures that end-to-end model management addresses the specific risks of AI (i.e., discriminatory biases and lack of trans...
September 15, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Supporting the Success of Workforce Inn...
Over 2 years into the COVID-19 public health emergency, the U.S. government continues to fund massive amounts of investment in pandemic relief. Recently the White House announced that $40 billion in American Rescue Plan investments have been committed to workforce development. This amount includes over $13B in workforce investments that have been committed or proposed by more than 1,000 State, Local, Tribal and Territorial governments.1 These...
September 15, 2022
Organizer: Equifax Government Team at Carahsoft
Location: Webcast
Add Favorite
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
September 13, 2022
Organizer: Okta Government Team at Carahsoft
Location: Webcast
Add Favorite
When All Fails: How To Be Cyber Resilient
There is a focus on ensuring an agency’s cybersecurity is as up to date as possible. But, what does one do when all systems put in place to assist in threat attacks break down? Given the high stakes in today’s cyber threat landscape, a good cyber strategy must be based on the assumption that, sooner or later, the agency’s defenses will fail. This assumption places the agency’s one step ahead of the attack: knowing that...
September 8, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Industry Profile: Building a Risk Manag...
Changes to the Cybersecurity Maturity Model Certification (CMMC), increased threats and risk to organizational data, third party vendor risk and increased numbers of compliance and framework requirements, makes it challenging to know where to start. Join this webinar to hear directly from one of your peers, Eric Matthews, Senior Strategic Advisor) from Alutiiq, about how he was able to effectively adopt and deploy the Cyturus Cyber Risk Tracke...
September 8, 2022
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search