Back to Search Begin New Search Save Search Auto-Notify
Flexible Log Management for Government
As government agencies scale their IT modernization initiatives and deepen their focus on security, managing and maximizing the value of growing log volumes becomes more challenging. This is in addition to complying with logging requirements outlined in mandates such as M-21-31. Join Datadog as they explore how to collect, process, and store large machine-generated data sets, transforming them from noise into actionable intelligence for your a...
October 3, 2024
Organizer: Datadog Government Team at Carahsoft
Location: Webcast
Add Favorite
Achieving Zero Trust with Kiteworks ...
Join Kiteworks, Proofpoint and Carahsoft for a live webinar to learn how integrating Proofpoint's email hygiene and threat protection with Kiteworks' encryption, compliance tracking, and usability can enhance your organization's security posture. Discover how this powerful combination safeguards sensitive communications and ensures regulatory compliance across your enterprise. In this webinar, attendees will explore:How to leverage Kiteworks ...
October 3, 2024
Organizer: Kiteworks Government Team at Carahsoft
Location: Webcast
Add Favorite
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
October 3, 2024
Organizer: FedInsider
Location: Austin, TX
Add Favorite
Accelerate AI with Trusted Data
The opportunities in AI are vast, from enhancing citizen services to bolstering national cybersecurity. In fact, there are over 700 AI applications in use across the Federal Government today and growing. For AI to be successful, your agency needs trusted data as its foundation. With data spread across clouds and on-premises centers, agencies seek secure hybrid cloud approaches to support their missions. Join Cloudera and AWS to explore how mul...
October 3, 2024
Organizer: Cloudera Government Solutions
Location: Washington, DC
Add Favorite
Nuxeo Deployment - Hyland Webinar for the EPA
Hyland's Nuxeo Platform revolutionizes enterprise content management with its cloud-native, low-code approach. Built on a scalable, modular architecture, Nuxeo ensures high performance even under the heaviest workloads, offering flexibility in deployment across various environments. Join Hyland, AWS and Aitheras experts for a webinar that demonstrates how the EPA can leverage Nuxeo for:Content Management: Centralize rich media assets within th...
October 4, 2024
Organizer: Hyland Government Team at Carahsoft
Location: Webcast
Add Favorite
Palo Alto Networks DHS User Group
Join the Palo Alto Networks DHS User Group on Friday, October 4th at the Carahsoft Conference & Collaboration Center in Reston, VA. We'll discuss the latest federal cybersecurity developments, including a Post-Quantum cryptography overview, and explore how Palo Alto Networks technology can empower your agency to stay secure in the face of evolving threats. A lunch will be provided during the event, where we will also be reviewing OMB M-23-...
October 4, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Innovate Cybersecurity Summit
Innovate Cybersecurity Summit is an invitation-only, all-expenses-paid, cybersecurity education event for CISOs and cybersecurity executives. Expert Education Every session is built on direct experience. Every talk is built on specific here-and-now takeaways. Every piece of advice is agnostic of specific tool or technology. Elite Networking We’ve built a meeting place that provides more direct, quiet and valuable access to one of your mo...
October 6-8, 2024
Organizer: Innovate
Location: Scottsdale, AZ
Add Favorite
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
October 7, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
October 7, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
5G as a Digital Transformation Accelerant
The United States leads the world in adopting 5G technology for communications and wireless internet access, thanks to its high speed, low latency, and increased bandwidth access. This has provided a huge boost to digital transformation in both the public and private sectors. For instance, the rapid adoption of edge computing can be attributed to 5G’s superior qualities. The spread of 5G was accelerated by the pandemic, as agencies and b...
October 7, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search