Back to Search Begin New Search Save Search Auto-Notify
DoDIIS 2022 Webinar Series: High Trust...
Anjuna and Carahsoft are excited to invite you to a webinar session leading up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Anjuna's Confidential Computing is a new breakthrough technology that shields data during runtime and creates high trust environments in the hybrid cloud. It leverages modern hardware to create a secure enclave in which da...
Add Favorite
DoDIIS 2022 Webinar Series: SolarWinds...
Participants will learn the following: Creating alerts that are actionable and provide information on what’s happening and how to fix the issue Removing false positives and false negatives from your alerts Correlating data from multiple modules to provide insight and reduce MTTR Tuning alerts that will get you to zero false positives
Add Favorite
DoDIIS 2022 Webinar Series: Mitigating...
Rubrik and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Cyber attacks strike every 11 seconds, leaving federal agencies and their data at risk. It's now a matter of when, not if, your agency will be impacted. Rubrik has introduced a new way of securing your agency's most important as...
Add Favorite
Carahsoft DoDIIS Webinar Series 2022 -...
SketchUp and Carahsoft are excited to invite you to join us in exploring how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. SketchUp is a fast and intuitive 3D modeler that allows you to combine project data in a single platform to ensure your team understands and builds the project efficiently.Register now to join our complimentary webinar to learn how to utilize project dat...
Add Favorite
Innovate. Adapt. Collaborate. DoDIIS 20...
Oracle and Carahsoft are excited to invite you to join us in our DoDIIS 2022 Webinar Series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. What makes Oracle Cloud Infrastructure (OCI) different from other cloud services? It starts with Oracle's unique approach to building secure, performant, standards-based, and second-generation cloud services that utilize the...
Add Favorite
Using Alteryx to Accelerate Workday Stu...
Data conversion is vital to the successful deployment of Workday Student, yet it is often one of the biggest sources of project churn. Most higher education institutions have legacy data in a variety of unique sources and formats, and much of that data will need to be imported to Workday-specific templates that often require complex, non-traditional manipulation and formatting to be loaded into Workday. Attendees joined this session, hosted by...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Data Movement Across All Environments
Discover use cases in which Cloudera DataFlow (CDF) and Cloudera Data Platform (CDP)'s data in motion tools are being utilized by Department of Defense agencies to provide access to all observable data in real time and contextualize it with industry data for more informed decision-making with maximum efficiency and agility. Join us for a deep dive into Cloudera's data in motion features and how they leverage Apache NiFi to: Provide a m...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Back to Search Begin New Search