Back to Search Begin New Search Save Search Auto-Notify
Splunk Cloud Meets the FedRAMP Security...
Join Splunk and your DOE peers in this on demand webcast on the recent Splunk FedRAMP authorization and what this means to DOE. During this DOE-focused webinar attendees will gain insight regarding: Overview of Splunk's FedRAMP announcement & Compliance Aspects of Splunk Cloud Benefits of leveraging Splunk in the cloud Splunk apps and premium solutions authorized for use What is and isn't covered when leveraging Splunk's FedRAMP SaaS offer...
Add Favorite
The Dawn of CMMC
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Mobile App Vetting at Scale with Your MDM
With over 4.5 million apps in the Apple AppStore and Google Play Store, how does your agency determine if an app is safe to use? Mobile device management (MDM) enables centralized management of mobile devices but needs accurate app vetting data to protect the enterprise at the mobile app level. NowSecure Experts Andrew Hoog, Founder, and Brain Reed, CMO, will explore the easy, high-impact way to control your mobile app risk with the NowSecure...
Add Favorite
Solving the CDM Puzzle with F5 Webinar
Straight talk on maximizing the value of DHS' Continuous Diagnostics and Mitigation (CDM) Program for your agency. Is the "Gap Fill" still leaving "Gaps" in capability, visibility and perceived value of the program? Did you know that there are specific steps that you can take to make the program work for you? Are you eager to find ways to advance your agency cyber priorities and accelerate investments in capabilities that are directly applicab...
Add Favorite
Getting Started with Splunk Data Manipulation
Join us on January 15th for the Getting Started with Splunk Data Manipulation workshop, a hands-on introduction to the Splunk GUI. Attendees will learn how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During this virtual workshop, attendees will utilize data to: Build several searches to gain more insight on the data set Explore how to set conditional searches Build custom visualizations...
Add Favorite
Microsoft Teams and Security Solutions...
Join McAfee and Carahsoft to learn how McAfee can help your organization move to the cloud with confidence by protecting critical data. During this on demand webcast, you will learn more about how McAfee can help with: Monitoring activity locally on each database server and by altering or terminating malicious behavior in real time Virtual patching that applies vulnerability-specific countermeasures and fixes misconfigurations, improving the s...
Add Favorite
Detecting Federal Insider Threats: A Ne...
Detecting insider threats in not just about protecting data. What if suspicious activity starts before data is accessed? What if data is not the target? Detecting modern insider threats requires a new approach tailored for Federal agencies. On January 16th, join Michael Davis, Chief Technology Officer of GoSecure and author of "Hacking Exposed", to learn how Federal agencies have a new tool in their arsenal to detect, and respond, the latest i...
Add Favorite
FAR Part 4 - Administrative Matters
This part prescribes policies and procedures relating to the administrative aspects of contract execution, contractor-submitted paper documents, distribution, reporting, retention, and files.
Add Favorite
Purpose And Status Of CMMC
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Add Favorite
Back to Search Begin New Search