Back to Search Begin New Search Save Search Auto-Notify
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
March 16, 2022
Organizer: Cofense Government Team at Carahsoft
Location: Webcast
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
March 15, 2022
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Modernizing Authentication Through the...
Today’s workforce expects flexibility and mobile has been the technology that empowers employees to work wherever and whenever they want. Employees are constantly using new devices to access sensitive organization information with the expectation of a painless user experience. IT departments are faced with the challenge of meeting this expectation while also ensuring that only authorized and verified users are accessing this information....
March 10, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Compliant and Secure Records Management...
Join us to learn more about: How to assess all physical record collections to determine those which need to be destroyed, digitized or sent to Federal Record Centers How to design, fund, and implement a digitization and cloud-based records management program Strategies to streamline information governance and security through content classification How to leverage the power of the cloud to scale your compliance and content management efforts M...
March 10, 2022
Organizer: Gimmal Government Team at Carahsoft
Location: Webcast
Add Favorite
Best Practices to Optimize SD-WAN Performance
Join Carahsoft and LiveAction for a webinar on how to optimize SD-WAN performance. As more government agencies look to SD-WAN for improved network performance and reduced communication costs across remote offices and distributed locations, knowing what you need to plan for a new solution isn't easy. NetOps teams need clear migration paths that de-risk the adoption and governance of the latest technologies. It doesn't stop after planning and im...
March 8, 2022
Organizer: LiveAction Government Team at Carahsoft
Location: Webcast
Add Favorite
Returning to the Workplace: Using IT Mo...
The workplace of February 2022 looks dramatically different from the workplace of March 2020. While employees have adjusted to the changes in policies, procedures, and even work location, are they as engaged and fulfilled as they were two years ago? Now more than ever, it is critical to provide self-service access to workplace information that helps people do their jobs and feel secure that management understands and is addressing their concer...
February 22, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Part 2: Unidirectional Secure Data Tran...
Join OPSWAT and Carahsoft for an exclusive webinar series focused on utilizing next-generation sandbox technologies to build your organization's zero trust strategy for both IT and OT environments.
February 10, 2022
Organizer: OPSWAT Government Team at Carahsoft
Location: Webcast
Add Favorite
Finding Apache Log4j Vulnerabilities In...
Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems. Jen Easterly, Director of CISA, called Log4Shell the most serious vulnerability she's seen in her career. There have already been hundreds of thousands, perhaps millions, of attempts to e...
February 8, 2022
Organizer: CyCognito Government Team at Carahsoft
Location: Webcast
Add Favorite
Provide Trusted Omni-Channel Communications
The pandemic has demonstrated the need for government services to be accessible, inclusive, and user-centric. The delivery of equitable, integrated customer and employee experiences requires a stack of flexible and secure technology that connects the government with people and allows the exchange of information and expertise across agencies. Get a head-start on 2022 and join these virtual seminars to learn more about the integrated technologie...
February 2, 2022
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
ATARC's Mission Critical Identity Secur...
Hear from topic experts as they explore how the Federal Identity-Centric Security Roadmap fits in with the advancement of Zero Trust Security. What does the concept of never trust, always verify mean? What are some best practices for verifying users in your network? What challenges have these topic experts experienced as they incorporate Zero Trust within their Federal Identity-Centric Security Roadmap? What solutions have these topic experts...
February 1, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search