-1 webcasts found
+ 283 upcoming events found
Back to Search Begin New Search Save Search Auto-Notify
Google Cloud 2020 Webinar Series: Setti...
Join Google Cloud and Carahsoft to learn how to turn data into actionable insights using a comprehensive 'serverless' data analytics and machine learning platform. Realize the benefits of 'no-ops', integrated, end-to-end data analytics that eliminates conventional limitations on scale, performance, and cost efficiency. During this on demand webinar, you will learn: Google's Data Analytics Platform Data Discovery capabilities in Google Cloud Pl...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
StorCycle Storage Management Software:...
Currently, more than 80% of data is stored on the wrong tier of storage, costing agencies millions of dollars a year. IT professionals intuitively know they are not storing their data efficiently because they lacked the correct tools to do so. Spectra Logic's StorCycle storage management software is an easy, affordable, and efficient solution built specifically to identify inactive data that consumes expensive primary storage capacity. StorCyc...
Add Favorite
ThoughtSpot Webinar Series
Session Three: IT Modernization ThoughtSpot makes it easy for anyone to get answers from their agency data in seconds with search & AI. Simply search using natural language to analyze your data and get automated insights with a single click. We invite you to join us and earn up to 3 CPE credits during this webinar series, where attendees will explore numerous topics. Now more than ever, it is critical for everyone to have rapid access to f...
Add Favorite
Fiscal Responsibility, Economic Recover...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? This informative session will enable you to become data driven through crisis, and learn how organizations found data analytics support during COVID-19. Hear inspirational stories from government customers who used creative data and analytics solutions during COVID-19 pandemic that were critical to their organi...
Add Favorite
DevSecOps Geek Week: Webinar Series
A philosophy. A movement. A culture. DevSecOps delivers powerful advantages: secure releases, greater interoperability and the freedom to focus on your team's mission. In addition to security, communication and collaboration are integral to this modern methodology. Carahsoft represents and delivers the most proven, innovative solutions needed for every phase of the DevSecOps lifecycle. View our on-demand series featuring Carahsoft's leading D...
Add Favorite
Skill and Reskill Government Employees...
As many agencies continue to work from home and settle into a new routine, now is the time to upskill and reskill your workforce. But how do you ensure effective training when you are no longer able to meet in-person? Watch the on-demand recording to learn how to quickly and effectively pivot your training strategy so you can continue to train and engage your workforce so they can remain productive from any location. Specifically, this session...
Add Favorite
DHS Ansible Foundations Workshop
Federal government agencies require robust IT and software capabilities to carry out their agency-specific missions and day-to-day operations. Automation has become a requirement to keep pace with the demands of modern IT environments. Red Hat Ansible Automation Platform uniquely positions organizations to succeed with its simple, powerful and agentless brand of automation. View this on-demand as Michael Hardee, Solutions Architect at Red Hat...
Add Favorite
Adobe Digital Learning Virtual Seminar...
As this pandemic has changed the way to work day-to-day, so has the way in which we disseminate training material. A virtual training program must adapt to all aspects of adult learning, while maintaining a high level of engagement. View this on-demand seminar on how to create and maintain high levels of retention and engagement in an online learning environment. Our team of eLearning experts will teach you the basics of Adult Learner Theory...
Add Favorite
The RPA Journey: Hyperautomation with U...
Robotic Process Automation (RPA) has the potential to automate entire processes or parts of processes that are repetitive, monotonous and occur in high volumes. Named by Gartner as a #1 strategic technology trend, Hyperautomation validates automation yet elevates it to show how the combination of RPA and disruptive technologies such as AI, machine learning (ML), process mining, decision management, natural language processing (NLP), and more c...
Add Favorite
Accelerate Security, Agility, and Visib...
Maintaining physical, on-prem servers can be expensive. Between the hard cost of on-prem equipment and the soft labor cost to maintain these systems, it's no wonder that more businesses are taking their holistic digital ecosystem to the cloud.View this on-demand webinar supporting your cloud migration efforts. As more critical workloads move to AWS, you need to gain critical security, operational, and cost management insights across your entir...
Add Favorite
Understanding Incoterms 2010
International Commercial Terms, or Incoterms®, are commercial terms or rules that define the seller's and buyer's responsibilities for the delivery of goods under a sales contract. They are published by the International Chamber of Commerce (ICC). Incoterms® are widely used in commercial transactions but often ignored until they are needed. Usually they are incorrectly used and in some cases taken for granted until a shipment goes wro...
Add Favorite
How to Boost Your VM Performance
Join the virtualization experts from Condusiv Technologies with over 30 years of I/O optimization expertise on February 6th for a complimentary webinar to learn more about how this solution can help you boost Virtual Machine (VM) performance without adding any new hardware.Hear about the two big silent killers of VM performance and why your heaviest workloads like those running on SQL, Oracle, Exchange, ERP, etc are only processing HALF the th...
Add Favorite
F5 Networks Privileged User Authentication
Join F5 Networks for a webinar where we will discuss how SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC/PIV/Smart Card enabled using F5 Privileged User Authentication (PUA). Attendees of this webinar will learn: How the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure...
Add Favorite
Application Security from the Cloud wit...
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infra...
Add Favorite
Google Cloud July Webinar Series - Save...
Enable your agency employees to quickly and easily find information within their own organization. We've packaged the Google Search exerpience to bring the power and simplicity to your organization not only in G Suite, but 3rd party applications as well. Google Cloud Search helps employees find the information they need at work from anywhere, using their laptop, mobile phone, or tablet. It searches across your organization's content in G Suite...
Add Favorite
Assess Your On-Prem Environment, See Yo...
Your path from On-Prem to the Cloud may have more questions than answers. Google Cloud can help you bridge those gaps with assessment and readiness tools that will give you confidence in your migrations to the Cloud. Join this webinar to learn how other agencies are adopting the Cloud and learn a simple phased approach to start your own journey to the Cloud. Hear from a Google Engineer about how Google Cloud can do a mutual assessment of your...
Add Favorite
Ransomware: The Cyber Warfare Attack To...
Ransomware attacks are on the rise, with at least 22 reported breaches of public sector networks in 2019 alone. Popular targets are cities, police stations, and schools, and the attacks can tally up millions of dollars in recovery costs. This situation is likely much worse, as many ransomware attacks are unreported. Public sector organizations are typically understaffed and underfunded, making them ripe targets for malicious actors intent on c...
Add Favorite
Splunk Tech Talk: Splunk Enterprise 7.3...
Join Splunk and SwiftStack on Tuesday, August 27th as experts discuss how Splunk Enterprise 7.3 with SwiftStack SmartStore helps reduce infrastructure costs by 60% to 75% for high-load, fast-growing Splunk shops. As terabytes become petabytes, every Splunk shop will require the efficiencies that Splunk Enterprise 7.3 with SmartStore delivers. And, SwiftStack will provide the cost-effective, scale-out storage to manage all of that Splunk data....
Add Favorite
Orchestrating AWS with CloudBolt
As organizations adopt AWS along with their other infrastructure resources running in other public clouds and in their data centers, IT admins must respond to growing complexity, problematic provisioning, and insufficient visibility and control. There is an increasing need for an easy-to-use platform that enables admins to abstract complex configuration settings through AWS, and then expose simplified workflows to end users who can start using...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Using G Suite to Cut Costs, Enhance Sec...
Please join Google and Carahsoft for a webinar to understand the value of G Suite and how to innovate by leveraging Cloud-based solutions. Learn how the public sector is improving citizen services & engagement, increasing operation efficiency, and delivering proven innovation with Google's highly secured, powerful technology. During this webinar, you will learn about: Innovative email & collaboration technologyGovernment-specific use c...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
NIST Compliant Architectures and Soluti...
This webinar will discuss the DoD Pathfinder efforts for DevSecOps and how Palo Alto Networks, through Twistlock provides capabilities to meet security controls requirements. We will also review NIST SP-800-190 specified security controls, federal compliance standards, advanced threat detection, and response requirements against secure solutions for regulated cloud workloads as well as on-prem solutions which utilize containerized solutions. T...
Add Favorite
Verve Webinar: Delivering Turnkey Secur...
The explosive growth of IOT and IIOT devices and technology is straining an already challenged OT environment for implementing and maintaining effective cybersecurity and reliability controls in operating environments. Traditional IT tools are ill-fitted and lacking in coverage outside of core IT systems and services, which is why we have built the first Operational Technology Systems Management (OTSM) platform. Our single pane of glass and ou...
Add Favorite
Cipher Summit 2019
Save the date for our SafeNet AT 2019 Cipher Summit! Attendees will hear from their peers, industry pundits, and technology experts about the current federal cyber security landscape and learn about the solutions needed to help solve the most pressing security issues.This one-day event will also feature technical sessions designed to help SafeNet AT customers' better leverage their current solutions and provide a forum for interactive discussi...
Add Favorite
Reduce Downtime. Gain Complete Visibili...
Join us on October 15th for a webinar where we will be covering a brief Splunk introduction, eliminating data silos, and server monitoring. Splunk is a log analysis platform that allows you to collect all logs, metrics, configurations, and messages so that you can search, correlate, alert, and report across your server in seconds. Eliminating silos allows for complete operational visibility across heterogeneous environments consisting of Windo...
Add Favorite
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
Add Favorite
Working with Mainframe and IBM i Data i...
Mainframes and IBM i systems continue to run many critical applications in the public sector; however, these systems are often left out of Splunk deployments because their data is complex and difficult to work with. A blind spot in your security and operational intelligence puts your organization at risk of failing an audit, or worse, so it's imperative to close this gap fast. Ironstream for Splunk helps eliminate this blind spot, by collectin...
Add Favorite
ICAM Modernization: Honoring Your Legac...
You are invited to join Okta, SailPoint, and Radiant Logic on the morning of October 22nd as we gather to learn from and engage with Identity Credentials and Access Management (ICAM) experts. We will discuss their best-in-class identity governance, access management and virtualization solution and how it is proven to facilitate digital transformation, providing agencies and organizations the convenience of unified access and single sign-on wit...
Add Favorite
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
Add Favorite
Delivering the Power of Collective Cybe...
Since IronNet was founded in 2014 by General Keith Alexander, the mission has been to deliver the power of collective cybersecurity to defend companies, sectors, and nations so that we all can live and work with peace of mind in cyberspace. Today, organizations around the world turn to IronNet to detect known and unknown cyber threat targets in their networks and share that information with peers so that all members can collectively defend aga...
Add Favorite
Splunk Cloud Meets the FedRAMP Security...
Join Splunk and your DOE peers in this on demand webcast on the recent Splunk FedRAMP authorization and what this means to DOE. During this DOE-focused webinar attendees will gain insight regarding: Overview of Splunk's FedRAMP announcement & Compliance Aspects of Splunk Cloud Benefits of leveraging Splunk in the cloud Splunk apps and premium solutions authorized for use What is and isn't covered when leveraging Splunk's FedRAMP SaaS offer...
Add Favorite
Getting Started with Splunk Data Manipulation
Join us on January 15th for the Getting Started with Splunk Data Manipulation workshop, a hands-on introduction to the Splunk GUI. Attendees will learn how to upload a .csv to Splunk, perform simple field extractions, and build basic dashboards and reports! During this virtual workshop, attendees will utilize data to: Build several searches to gain more insight on the data set Explore how to set conditional searches Build custom visualizations...
Add Favorite
Microsoft Teams and Security Solutions...
Join McAfee and Carahsoft to learn how McAfee can help your organization move to the cloud with confidence by protecting critical data. During this on demand webcast, you will learn more about how McAfee can help with: Monitoring activity locally on each database server and by altering or terminating malicious behavior in real time Virtual patching that applies vulnerability-specific countermeasures and fixes misconfigurations, improving the s...
Add Favorite
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Add Favorite
Google Cloud 2020 Webinar Series: Janua...
The IT infrastructure of many government agencies is largely comprised of Virtual Machines. As CIOs begin to implement their Cloud adoption strategies, it is imperative that their teams understand the processes and tools available for moving these workloads to the Cloud. This webinar will cover the lift and shift approach to migration and how Google can help accelerate the path to the Cloud for Linux and Windows Virtual Machines. During this w...
Add Favorite
Next Level Security with Infoblox
Security teams know painfully well that it takes too long from the time a breach happens to being able to identify what happened and how. Rather than investing in another security tool, what you need is a smarter and more efficient way to manage and secure your entire network. The Infoblox security solution is a platform designed from the ground up to protect enterprise networks, users and devices from becoming victims of today's sophisticated...
Add Favorite
Adobe Digital Learning Seminar in San A...
Every day you undertake the challenge of training your workforce to maintain compliance, work skills, and relevance, and with all the resources you put into training, you want to make sure the message sticks. Join us in San Antonio to discover how understanding the modern adult learner and identifying their style of learning will affect your content mediums and delivery styles. Whether you teach in-person, online, or in a blended learning env...
Add Favorite
Google Cloud 2020 Webinar Series: Strat...
Join Google Cloud and Carahsoft for a webinar to receive a roadmap of database migration options and strategies for migrating to GCP. Moving your existing on-prem workload can be challenging when your agency doesn't have a clear understanding of how to move its databases with minimum risk. Register and attend to learn how to run a comprehensive assessment of existing on-prem environments and provide a list of criteria for decision making, a ro...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
Mitigating Your Data Complexity
Too many organizations struggle with the complexity of their own data. An extensive 50-60 percent of enterprise data is "dark" and serves no valuable insight, according to IBM and Veritas research – don't let your agency be held back by that same confusion. You need to be able to tackle business challenges without worrying about the complexity of your IT environment. Join us for a live webinar on the necessity of abstracting complexity f...
Add Favorite
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
Add Favorite
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
Add Favorite
SOAR Into Advanced Cyber Defense with S...
Join Splunk and Carahsoft for a presentation and demo where we will discuss how Splunk Phantom can help your team achieve optimum security operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage technology for orchestration and automation as an integral part of their Security Operations Center (SOC) platform to accelerate incident response while addressing the skills shortage. T...
Add Favorite
Splunk Enterprise Security for the Army
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous monitoring, incident response, SOC operations, and providing executives a window into business risk.Join Splunk and Carahsoft for a pr...
Add Favorite
The Future of Encrypting Network Data
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ links) networks to securely deliver information when and where we need it has increased. Thales Trusted Cyber Technologies, offers a network security solution th...
Add Favorite
Adobe Digital Learning Seminar in McLean, VA
Every day departments undertake the challenge of training their workforce and with all the resources put into training, it's important they are leveraged efficiently and effectively. More and more government clients are turning to learning & development of personnel as their force multiplier. Department of Defense is prioritizing funding to programs like Navy Education for Sea Power, Army Talent Management, and Air Force Learning Continuum...
Add Favorite
Web Series: Demystifying Cyber Threat H...
Traditional cybersecurity practices are failing to detect threats that exist in the gaps of networks and cyber teams. Cyber tools are only alerting us to what we know, but do not indicate new security risks unique to individual agencies. With threat hunting, security risks can be identified throughout the entire network revealing gaps in your agency's security that common cyber tools miss.Join CybernetIQ and Carahsoft for our web series to div...
Add Favorite
Web Series: Demystifying Cyber Threat H...
Traditional cybersecurity practices are failing to detect threats that exist in the gaps of networks and cyber teams. Cyber tools are only alerting us to what we know, but do not indicate new security risks unique to individual agencies. With threat hunting, security risks can be identified throughout the entire network revealing gaps in your agency's security that common cyber tools miss.Join CybernetIQ and Carahsoft for our web series to div...
Add Favorite
Keeper Defending U.S. Government Agencies
Cybersecurity starts with password security. 81% of all data breaches are due to weak password security. How can we prevent these breaches while quickly and cost-effectively closing the largest security gap in government agencies? The answer is with strong password policies, enforced by an easy-to-use, intuitive password security solution. Join Keeper for a webinar on March 24th to learn how to best protect your agency. During this webinar, Da...
Add Favorite
Securing Splunk: Balancing Big Data Ben...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating...
Add Favorite
Identity 3.0 for the Department of Ener...
The Department of Energy has spent years deploying legacy Identity Management (IDM) solutions and Privileged Access Management (PAM) solutions - many having spent millions on deployment, infrastructure, maintenance, and staffing. Little value gained in return - countless hours of effort focused on a handful of systems, directories, or databases with no significant improvement to compliance and security. As agencies move toward digitally transf...
Add Favorite
Splunk ESI Contract and NAVSEA
NAVSEA has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DOD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to NAVSEAHow to leverage the contractDon't miss out. R...
Add Favorite
Google Cloud 2020 Webinar Series: Moder...
Join Google Cloud and Carahsoft to learn how you can modernize your legacy applications into microservices. We will start off by showing you some patterns for breaking a monolith into microservices. We will demonstrate how to use Cloud Run to quickly deploy stateless, serverless workloads. Finally, we will show you how you can use Istio to secure and monitor your deployed microservices. This on-demand webinar will cover: Patterns for creating...
Add Favorite
Build a Strong Insider Threat Detection...
Insider threats are still a growing problem, despite increasing mindshare and budgets. The key to stopping these threats - and to strengthening the organization as a whole - is making data-driven decisions using visibility into data, machines, applications, and people. In this webcast, presented by Dtex Systems and Carahsoft, Dtex will share how they are helping to utilize data to build stronger business and security strategies. We will discus...
Add Favorite
Insights for Optimizing Your Storage
Data is a critically powerful tool, but your database can be more of a crutch than an asset if your agency lacks a complete understanding of its storage management environment.Join us for this live webinar hosted by data management expert, Rich Rose, to learn how your agency can achieve storage management optimization (i.e., the full utilization and understanding of its data environment), and receive significant cost-savings efficiency!Attende...
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
CMMC: What You Need to Know and How to...
The U.S. Department of Defense (DoD) is now requiring all companies that do business with them to obtain the Cybersecurity Maturity Model Certification (CMMC). All 300,000 members of the Defense Industrial Base (DIB), which include suppliers of goods and services to DoD are looking for answers to questions they have regarding CMMC. This on-demand webcast will provide some much-needed answers to questions about what you need to do to get starte...
Add Favorite
Investigating SAP in Real-Time with Splunk
Join Rhondos and Carahsoft as they present SAP PowerConnect for Splunk, the only certified solution to bring all data from SAP to Splunk. SAP is an organization's largest, most complex, and most critical financial application and until now real-time monitoring has been extremely limited. By essentially writing a Splunk heavy forwarder as an SAP add-on in SAP's native languages, PowerConnect allows organizations to leverage Splunk for security,...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
Splunk's Operational Impact in the DoD...
Join us as we share stories of Splunk's Department of Defense and National Security customers realizing the value of bringing data to every decision. Examples will include:ITSI driving unprecedented Operational IntelligenceEnterprise Security setting the standard for Security Operations Center (SOC) incident response and mean time to resolution (MTTR)Phantom force multiplying front line analysts through orchestration and automationThis will be...
Add Favorite
How to Maintain CIS Controls in a Remot...
In light of recent events, most of the country is now turning to a remote setup very rapidly. As a result, new devices are now establishing remote connections since many employees are connecting their personal computers to the corporate network, making the attack surface bigger than ever before. Compliance, proper network segmentation, and accurate device network access control are extremely challenging for any IT team right now and the attack...
Add Favorite
Google Cloud 2020 Webinar Series: Strea...
Join Google Cloud and Carahsoft to learn how to maximize the use of your data warehouse. A data warehouse is only as useful as the data that you're able to store within it. This webinar and demonstration will focus on the technologies and processes of ingesting both batch data and real-time fight data into a data warehouse. Specifically, it will focus on technologies such as Pub/Sub, Apache BEAM (on Google DataFlow), and BigQuery. This webinar...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Splunk for CMMC Solution: A Deeper Dive
Join Splunk's, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations' journey to actively monitor and measure the performance of data-driven practices defined by CMMC. In this session, we'll dig into the following topics with demonstrations throughout on: Al...
Add Favorite
Overcome Portfolio Management Challenge...
Stuck at home and worried how your IT or Program Investments are faring? Federal agencies are experiencing extreme scrutiny on the spending of their budgets. These organizations face the challenge of understanding and integrating data from many portfolios. Strategic Plans and Enterprise Architecture are often rarely consulted and have little impact. This creates a situation where senior and accountable decision-makers do not know how their bud...
Add Favorite
Business Continuity in Uncertain Times:...
If you are experiencing remote work performance or availability problems, than the scale and reliability of a cloud solution may ease your burden. Akamai's Enterprise Application Access (EAA) solution can provide access to critical applications no matter where they are hosted, maintain the continuity of agency's core functions, and leverage a Zero Trust approach to maintain security. Join Akamai and Carahsoft for a discussion on how your busi...
Add Favorite
Modernizing Citizen Experiences with Cl...
The explosion of devices and communication channels in recent years presents government with a serious dilemma: How do agencies interact with citizens who increasingly rely on smartphones and tablets for public services? Citizens expect government agencies to meet them on their terms, and today that means a quality customer experience (CX) that’s digital, seamless and unfolds on any channel, device or platform they choose. More important...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Google Cloud 2020 Webinar Series: Augme...
Hints of a threat can come from anywhere, including places you weren't expecting. Join Google Cloud and Carahsoft to learn how to protect you and your organization from potential threats. The key to identifying a threat is to gather all of your data, be able to uniformly examine your threat events, and be capable of drilling down and pivoting with direct access to underlying data. Master how to properly apply machine learning and analytics tha...
Add Favorite
Digital Compliance and eDiscovery Webinar
Join Veritas and Carahsoft on Tuesday, April 21st for a webinar briefing on how you can help your agency maintain digital compliance through mitigating risk and gaining visibility into your data.This event will cover:Digital Compliance Overview: How to increase your FITARA ScorecardeDiscovery Best PracticesExpert Federal Uer Group Panel Discussion: "HOW'D THEY DO IT? - Veritas Federal Customers Sharing Best Practices"
Add Favorite
Webinar: Putting Public Safety First –...
This webinar will provide an orientation to Oroville Dam and the State Water Control Project, the February 2017 incident and present the immediate recovery response. Five Learning Objectives of This Course: Introduction to Oroville Dam and the California State Water Project Summary of the February 2017 spillway incident Immediate recovery response Main Spillway recovery response Emergency Spillway recovery response
Add Favorite
Webinar: Concrete Repair and Maintenanc...
This course will provide an overview of the best methods and materials for concrete repair and maintenance. It will include a description of a systematic process to follow to achieve best results and will include information from recent industry wide research efforts to ensure long lasting durable repairs. Five Learning Objectives of This Course: Conducting a thorough condition assessment Most common types of concrete damage Selecting the corr...
Add Favorite
Refreshing Your Data Strategy for the N...
The agility and improved mission support associated with the widespread move to cloud computing has made this megatrend one of the most positive forces in government IT. However, optimizing the use of multiple public clouds and on-prem solutions comes with challenges, especially with how data is managed in this environment. Publisher of CTOvision, Bob Gourley, will review key challenges that follow the use of hybrid clouds for data analytics....
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
Google Cloud 2020 Webinar Series: Actio...
Get insights into external file sharing, visibility into spam and malware targeting users within your organization, and metrics to demonstrate your security effectiveness in a single, comprehensive dashboard. Join Google Cloud and Carahsoft to learn how you can identify, triage, and take action on security and privacy issues in your domain. During this on-demand webinar, you will learn how to: Understand which files have been shared outside yo...
Add Favorite
Enhance Visual Insight from Your Aerial...
When it comes to gathering visual data, drones can assist while reducing risk, saving time, and decreasing costs. These aerial systems come in all shapes and sizes and can utilize a variety of sensors depending on the task at hand.So, how do you pick the right one for the job? Start with your desired data and work backward from there. The data you need will determine the requirements of your vehicle. Register today for our complimentary webina...
Add Favorite
Turn Data Into Doing with Splunk - Week...
The speed and the velocity of the decisions that public sector leaders have to make has increased, and the criticality or impact of those decisions is increasing as well. Getting every decision right could make or break the mission. That's ultimately the challenge today. How can I make decisions faster? And how can I be more confident in each decision that I make? Join Splunk for our on-demand weekly webinar series to learn more about how brin...
Add Favorite
Splunk & Forescout for Smart Transportation
Join Splunk, Forescout, and Carahsoft to see how Forescout provides continuous visibility of connected devices to Splunk to better identify, prioritize, and respond to incidents. The joint integration also enables the getting and storing of Forescout actions in Splunk. Policy-driven actions can be triggered by Splunk and executed through Forescout for immediate incident response. Forescout sends the action results to Splunk to facilitate close...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Join Google Cloud and Carahsoft to learn how Anthos is an open hybrid and multi-cloud application platform that enables you to modernize your existing applications, build new ones, and run them anywhere in a secure manner. uilt on open source technologies pioneered by Google - including Kubernetes, Istio, and Knative - Anthos enables consistency between on-premises and cloud environments and helps accelerate application development. During thi...
Add Favorite
Enterprise Archiving For Federal Agencies
With email being the largest repository to manage, it's critical that Federal agencies supervise and retain this content according to regulations. Proofpoint Enterprise Archive is a FedRAMP authorized, cloud-based email archiving solution. It provides a centralized, third party, searchable repository to help federal agencies simplify legal discovery, respond to FOIA requests, and implement email records management according to NARA Capstone g...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
New DHS CISA TIC 3.0 Guidance Makes Clo...
Effective immediately, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) issued new TIC 3.0 guidance allowing agencies to roll out zero trust direct-to-cloud connections through cloud service providers (CSPs) that meet CISA guidelines. This new guidance helps agencies avoid the challenges of VPN, which include infrastructure exposure and highly latent traffic paths due to traffic being forced to tr...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
How to Deliver NIAP Compliant Mobile Ap...
The National Institute of Standards and Technology has partnered with the Department of Defense and several federal agencies to create a standardized mobile app vetting process for the National Information Assurance Partnership (NIAP) compliance. In 2019, NowSecure partnered with the U.S. Air Force to kick off the creation of an automated software security testing solution to enable NIAP compliance for mobile apps. This is an easy-to-use solut...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Google Cloud Webinar Series: Augment Em...
Please join Google Cloud and Carahsoft for a webinar to demonstrate capabilities both within G Suite and Google Cloud Platform to detect, identify, and remediate end-user security events. Learn how public sector entities can respond to successful phishing attacks that impact other assets on the network, and take Google's approach in isolating the attack vector. During this webinar, you will learn about: End-to-end incident management, from end...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Infinera Live Virtual Federal Tradeshow
Teleworking and telecommunication networks have become a necessity in helping people stay connected and productive. With the cancellation of trade shows and restrictions on face-to-face interaction, it has become harder to stay up-to-date on the latest networking innovations.Infinera is leading the industry with their latest revision of the Infinate Capacity Engine (ICE6) delivering unbreakable records in both capacities and reach. XR Optics d...
Add Favorite
ThoughtSpot Learning Series: AI Driven...
Join this webinar to hear Jordan Suffin discuss the ThoughtSpot End User Experience, which is designed to teach participants the core end user functionality of ThoughtSpot. Attendees will explore basic search, changing visualizations, saving answers, drilling, and filtering. ThoughtSpot makes it easy for anyone to get answers from their agency data in seconds with search & AI. Simply search using natural language to analyze your data and g...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
RPA Webinar: Navigate the Authority to...
UiPath robots are being pressed into service from the 69 federal agencies using RPA now more than ever. As we come out of current pandemic, the speed at which citizens will want services and the need for agencies to attack the backlog built up over the shutdown makes RPA an operational necessity. This necessity and urgency are often faced with one challenge - securing permission to use the software. Over the past twenty months, UiPath has work...
Add Favorite
Architectural Design: From floor plan t...
When designing architectural layouts, an accurate understanding of space and dimension is imperative. Why limit perspectives to ordinary floor plans? Enhance design workflows and engage with projects in 3D with SketchUp! Join this webinar for a full demonstration of drawing, importing, scaling, and extruding a floor plan into 3D. Specifically, participants will learn how to: Place 3D doors and windows into the SketchUp model Enhance architectu...
Add Favorite
Expense Tracking for FEMA Cost Recovery
In a crisis like COVID-19, tracking FEMA and other public assistance disaster recovery expenditures at the required level of detail is a common pain point for organizations. Join this complimentary webinar to hear experts from the City of Tallahassee, Florida share how to optimize the tracking of FEMA disaster recovery expenditures, best practices for tracking emergency reimbursements, and the City's journey to improve resource allocation for...
Add Favorite
AvePoint #WFHready Webinar
As government employees and contractors are all adjusting to the new normal of working from home, Microsoft Teams has become a critical component to ensuring remote worker productivity and mission continuity. How do employees maximize their time working from home with Microsoft Teams? How can IT fight content sprawl and still protect key mission data? What type of information is being stored in these teams (and is it backed up) and what polici...
Add Favorite
ThoughtSpot Webinar Series
Session One: Tuesday, May 26th Workforce Contingency ThoughtSpot makes it easy for anyone to get answers from their agency data in seconds with search & AI. Simply search using natural language to analyze your data and get automated insights with a single click. We invite you to join us and earn up to 3 CPE credits during this webinar series, where attendees will explore numerous topics. Now more than ever, it is critical for everyone to h...
Add Favorite
Full API Lifecycle Management with Red...
Join Red Hat and Carahsoft to explore how Red Hat Integration, an API-centric solution, supports the full spectrum of modern application development. Manav Kumar, a senior solutions architect at Red Hat with over 18 years of experience implementing enterprise integration solutions, will address: The benefit and value of APIs API lifecycle management and API first-design approach How to design, build and deploy your APIs Ways to control your AP...
Add Favorite
Adobe Digital Learning Virtual Seminar
Create, Manage, Deliver, and Track Exceptional Online Learning Programs Now that instructors and enablement teams are moving everything online, creating an engaging virtual learning environment has never been more vital. Join us online for a complimentary virtual seminar on how to create and maintain high levels of retention and engagement in an online learning environment. Our team of eLearning experts will teach you the basics of Adult Lear...
Add Favorite
Design Engaging Creative Communications...
Agencies face the challenge of digitally converting communications such as newsletters, reports, and articles into digital communications that reach citizens faster and with more impact. Visuals within these messages make a lasting impression, and including images with information-rich text is proven to capture your target audiences. Join our complimentary webinar to learn how to access the vast library of high-quality images available to you...
Add Favorite
Meet Citizen Expectations With Personal...
Public expectations are driving government agencies to modernize their email outreach and engagement. Agencies who modernize their email communications can help more people access more services while serving the unique needs of many at scale. By mapping out the milestones of the citizen journey, agencies can predict what information citizens will need at every turn, enabling proactive communication connections and the expedited delivery of per...
Add Favorite
Understanding SASE: Why the Future of N...
Please join NetFoundry and Carahsoft to learn the key principles of SASE (Secure Access Service Edge) networks and how your agency can benefit from adopting this model. The digital transformation of businesses to an app-centric world reverses network and security service design conventions. This shift has caused individuals and/or teams responsible for security and risk management to look to a converged, cloud-native SASE to protect critical s...
Add Favorite
Content Discovery for Law Enforcement A...
In this webinar we will show state of the art capabilities in the areas of automatic face, text, object, and scene recognition, all in an integrated package. This combination of features streamlines the process of content discovery. These tools help analysts and investigators dig deeper and wider, while at the same time achieving much higher levels of productivity. Collecting and analyzing images and videos is the lifeblood of many law enforce...
Add Favorite
Splunk High-Performance Computing
Since the 1960s, supercomputers have played a critical role in countless scientific advancements. Traditionally, High-Performance Computing (HPC) was limited to exclusive groups such as university and government research. The commoditization of computer hardware experienced over the last decade has made HPC ubiquitous in its adoption. HPC is now mainstream and rapidly spreading across enterprises including academia, R1 institutions, banking, f...
Add Favorite
Leveraging APIs for IT Modernization wi...
The ability of government agencies to leverage application programming interfaces (APIs) has led to faster deployments, advanced automation and tighter integration between both hardware and software. The Application Programming Interface (API) defines methods for communication from multiple sources, formats to be used, standard structures and how the requests should be made.Join Red Hat and Carahsoft on June 4th to learn how Red Hat's enterpri...
Add Favorite
Stay on Top of Records Release
While Law Enforcement agencies have implemented more ways to capture audio, video, and text-based evidence, many are now considering how to store and find key moments within their records to quickly respond to requests for release to the public. Regardless of your agency size or type, the impact of slowly responding to records requests can be damaging, yet the average agency lacks the resources and time to properly find and redact records with...
Add Favorite
Develop a Dynamic Multicloud Strategy
"If the public cloud is not our least expensive option, what is?" "I'm tired of compromising our resiliency capabilities." "How can we ensure the best performance of my agency's applications?" The above concerns from our customers are based upon the fact that 85% of all stored data is dark (i.e., data that is not completely and/or accurately known, or relevant to the agency mission). What measures can your agency take to fully understand and u...
Add Favorite
Amplify and Integrate Your Phishing Def...
Phishing attacks are relentless, and attackers continue to find creative ways to evade perimeter technologies such as Secure Email Gateways (SEGs). As malicious emails continue to reach user inboxes, there's increased risk of account compromise, data breach, and malware attacks, including ransomware. However, by combining training and human intuition with trusted intelligence, you will be able to reduce your organization's phishing threat expo...
Add Favorite
How to Maximize Revenue Through Cost Al...
Traditionally, cost allocation and indirect cost planning seem like an ancillary matter in the scheme of all that leaders in state, local, and tribal governments have to do. However, reporting the true cost of services agency-wide is hard to capture, especially in the wake of COVID-19 bringing revenue shortages, and several grants and funding streams to navigate.The challenges that are compounded when individual departments complete their fina...
Add Favorite
Being Data Driven Through Crisis: How O...
Digital transformation is on the roadmap of every company. What happens when transformative change is driven by disruption and crisis? Hear inspirational stories from government customers who found creative data and analytics solutions during COVID-19 pandemic that were critical to their organization. Join us for the second webinar on Healthcare: Transformation & Readiness in response to COVID-19, and discover how Tableau can help you to r...
Add Favorite
Navigating the Security Maze of the Rem...
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures. The new remote work and remote learner environments provide attackers with a new entry point which they can exploit more easily than the well-defended network used in the past. Leveraging malware po...
Add Favorite
Why Mezzanine Helps Achieve the Best Si...
With teams distributed around the country, federal agencies need to collaborate effectively. Remote meetings are the new standard, and they require participants to share and view content in real-time. With current collaboration solutions, only one person can share content at a time, resulting in poor engagement and making situational awareness difficult. Oblong's Mezzanine solution allows you to share 10 live streams of information simultaneou...
Add Favorite
Splunk ESI Contract & Air Force
Air Force has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to Air ForceHow to leverage the contractDon't miss...
Add Favorite
Transform Windows 10 with VMware Modern...
Windows 10 opens the door for you to transform siloed desktops, mobile device and application management, and adopt a unified approach across your organization with its new cloud-based management framework known as Modern Management. Modern Management represents a shift in the Windows management process to support the delivery of policies, updates, patches, and applications from the cloud. Windows 10 enables cloud-based delivery of security po...
Add Favorite
Remote Work with NVIDIA: GPU Accelerate...
As the public sector is called upon to address society's most pressing challenges, teleworking has become a crucial way for employees and contractors to maintain continuity and responsiveness. With NVIDIA Quadro RTX-powered laptops, virtual workstations, and cloud computing, you can tackle critical day-to-day tasks and compute-heavy workloads--from home or wherever you need to work. By attending this live CPE webinar, you'll learn: How the pow...
Add Favorite
Dragon Speech Recognition: Increased Pr...
Join us for this webinar and see how Dragon Speech Recognition Solutions enables you to keep up with documentation productivity and generate reports with higher detail and accuracy while accelerating professional documentation. From transcribing committee meetings and correspondence to drafting hearing notes and reports, Dragon Speech Recognition Solutions let you do it all—faster and more efficiently. You can increase your productivity...
Add Favorite
RMF Compliance with Splunk: Continuous...
The Risk Management Framework (RMF) was introduced to help federal agencies better manage the many risks correlated with operating an information system. Splunk offers a flexible, cost efficient, and integrated solution to allow agencies to meet their RMF compliance requirements. Join Splunk and Kinney Group for an introduction to Splunk and how you can meet RMF requirements within the United States Air Force. During this webinar, attendees wi...
Add Favorite
Improving Remote Employee Support
COVID-19 concerns are changing how agencies run their business and IT operations, dramatically expanding demand for teleworking and application access to collaborative systems. This demand is creating significant challenges for IT operations and has increased the need for IT pros to keep applications, services, and infrastructures up and running—and safe. This instructional webinar will focus on Performance monitoring solutions that prov...
Add Favorite
Splunk: Driving Patient Privacy
Patient privacy is an ever-growing concern within our medical community. Join Splunk, True Zero Technologies, and Carahsoft to learn how Splunk uses data from all data sources to identify breach or leak incidents concerning ePHI.During this webinar, we will discuss how:Proactive measures and real time response to security breaches or unauthorized access attempts help ensure privacy of patient informationImplementing these protective measures h...
Add Favorite
News Flash: Splunk's Real-Time Monitori...
Monitoring is evolving into observability to find the "unknown, unknowns" that impact DOE's business, SLAs, and critical applications. Join Splunk for a DOE-focused webinar on detecting, investigating, and diagnosing problems easily with end-to-end observability leveraging Splunk's SignalFx. During this webinar, attendees will go over the following topics: Modernize Legacy Services and Applications:Correlate applications and infrastructure reg...
Add Favorite
How to Implement an Effective Zero Trus...
The rapid adoption of IoT devices, cloud infrastructures, the recent expansion of remote workforces, and the increased execution of service contracts with multi-tier contractors have created massive distributed IT networks placing more emphasis on Zero Trust approaches. These distributed environments display increased attack surface areas, creating multiple entry points for adversarial actors to penetrate and potentially own a technology ecosy...
Add Favorite
How the IRS Unlocked Data from Legacy A...
The ongoing pandemic has highlighted the criticality of many Federal and State agencies' ability to quickly and accurately share data outside of their organization. However, many agencies struggle to even share their data amongst the applications within their own portfolio. In this webinar, we will explore how the IRS was able to liberate vast amounts of data "locked up" in legacy applications - freeing it for use all across the agency and bey...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
Find the Malicious Code Hiding on Your...
80% of web pages contain at least one third party library security vulnerability. Script threats like web skimming, formjacking, and Magecart attacks can steal data from visitors to your website. Content from third party sources are increasingly becoming major attack vectors for script attacks, which take advantage of compromised web tools you need. Join Akamai and Carahsoft for a complimentary webinar on June 24th to learn how you and your ag...
Add Favorite
Protecting Your Network Infrastructure...
Webinar Series: Protecting Your Network Infrastructure with Automation, Visibility and Continuous Insight Infoblox, in collaboration with Empowered Networks, presents a three-part webinar series covering Infoblox's NetMRI capabilities, compliance, and configuration automation tasks. Register now for one or more of these upcoming sessions! Webinar 1: Thursday, April 9, 2020 | 11:00am ET; 8:00am PT NetMRI Basics: What is Infoblox NetMRI and How...
Add Favorite
Splunk ESI Contract and DoD
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk.Join Splunk and True Zero Technologies as we discuss:How the contract has been structuredThe value it brings to DoDHow to leverage the contractDon't miss out. Registe...
Add Favorite
Accelerate Your Time-to-Sight with CDP...
CDP Data Center is the industry's most powerful, comprehensive data management and analytics platform for on-premises IT environments. Powered by a 100% open source distribution that combines the best technologies from Cloudera and Hortonworks, CDP provides the foundation for extending your workloads to private cloud. By attending this live CPE webinar, you will: Learn how CDP Data Center innovates your data analytics core to deliver faster, r...
Add Favorite
Modernize Your On-Prem Datacenter with...
VMware Cloud Foundation brings together virtualized compute, storage, and networking into a unified cloud operating model that allows your organization to reduce costs while increasing agility, standardization, and intrinsic security. By combining consistent infrastructure, operations, and intrinsic security posture across the entire stack, VMware’s Cloud Operating Model serves as the easiest and most efficient way to deploy, update, and...
Add Favorite
Protecting Government and Corporate Sup...
Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it's changing how businesses and the federal government protect their supply chains.Join IronNet Cybersecurity, Amazon Web Services (AWS), and Carahsoft on June 25th for an insightful webinar on how a collective defense strategy allows federal agencies to:Better understand their threat land...
Add Favorite
Moving to the Cloud with Operational Security
Federal agencies are under pressure to streamline and modernize infrastructure to reduce costs – and at the same time, they must also improve security. In this era of cloud computing, security products must work together seamlessly, and agency security teams need solutions to defend and protect government assets in the cloud. Cloud computing requires agencies and their security partners to focus on both securing data on-premise and data...
Add Favorite
Red Hat Ansible Webinar Series: Automat...
Join Red Hat's Dan Lemus and partner experts for three webinars worth of insights on Red Hat Ansible, Red Hat's industry-leading platform for building enterprise-wide IT automation. Automate Networks to Accelerate Operations Erik Ellner, Director, State, Local & Education, Dynamic Systems Thursday, July 9, 2020 | 1pm ET; 10am PT The first step in digital transformation is automating your current processes, freeing your teams to focus more...
Add Favorite
Transform Endpoint Security with VMware...
In 2020, cyber defenders have seen a high level of innovation from cybercriminals, who are leveraging new tactics, techniques, and procedures (TTPs) to maintain persistence and counter incident response efforts. At an alarming rate, transnational organized crime groups and spies are leveraging cybercrime tools and services to conduct a wide range of crimes against government agencies and financial institutions. Criminals are increasingly shari...
Add Favorite
Webinar: The State of the Practice of D...
This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted. What are the five takeaways/learning objectives attendees will receive from this course: What met...
Add Favorite
Immediately Gain Value From IoT
Enterprises are struggling to see value from IoT implementations. One of the main challenges is just getting real-time data from edge devices. Other challenges faced by government agencies include network availability, latency, cost of round-tripping between the edge and the enterprise, monitoring, and more. A new solution is needed to quickly manage and monitor thousands of edge agents deployed in or near the edge devices to enable edge data...
Add Favorite
Introduction to Cryptocurrency Concepts
What Government Agencies, Regulators, and Investigators Need to Know As government agencies, regulators, and investigators look to more accurately assess the risks associated with the nascent industry of cryptocurrency, it is important to identify key players within the ecosystem. This complimentary webinar will cover the various typologies across the cryptocurrency space including gambling sites, hosted wallets, mining pools, high-risk exchan...
Add Favorite
Transform Paper-Based Workflows to Effi...
As public sector agencies nationwide take steps to maintain continuity of operation, many have had to evaluate the resources needed to sustain regular functions and processes, while seamlessly transitioning to online operations. By converting paper-based workflows to powerful digital forms and updating your agency's current digital processes, you will equip citizens with an easy way to find secure online forms, while increasing the efficiency...
Add Favorite
Thriving in the Cloud: Cloud Adoption f...
Moving to and thriving in the cloud can lead to distinct outcomes for the public sector agencies and teams such as technical agility, flexible scaling for planned and unplanned traffic peaks, cost optimization, and improved citizen experience.As the first step in your cloud adoption journey, successful migration sets a firm foundation for future work in the cloud. How you begin is a strong indicator for your long-term success.Join New Relic an...
Add Favorite
Red Hat and Anchore Discuss DevSecOps i...
The United States Department of Defense (DoD) is taking a new approach to building, deploying and operating software. To maintain their competitive edge, they are integrating DevSecOps practices into each stage of the software development process. Join Anchore, Red Hat and Carahsoft to hear from Anchore's Craig Bowman and Red Hat's Michael Epley, to discuss their contributions to the DoD DevSecOps Platform (DSOP) including: Understand the impo...
Add Favorite
Red Hat Ansible Webinar Series: How to...
Join Red Hat's Dan Lemus and partner experts for three webinars worth of insights on Red Hat Ansible, Red Hat's industry-leading platform for building enterprise-wide IT automation. Automate Networks to Accelerate Operations Erik Ellner, Director, State, Local & Education, Dynamic Systems Thursday, July 9, 2020 | 1pm ET; 10am PT The first step in digital transformation is automating your current processes, freeing your teams to focus more...
Add Favorite
IT Service Delivery for Distributed Wor...
Join Splunk, Forescout, and Alchemy Global to see how our solution will secure IT service delivery for distributed workforce enablement. With an unprecedented growth in remote connections, our workforce faces a new host of logistical constraints and a larger attack surface than ever before.Before we build an effective remote workforce program, we must ask these questions:How many endpoints are connected at any given time?Are those endpoints co...
Add Favorite
Enhance Everyday Workflows with Augment...
Augmented reality (AR) is a commonly used term when teams are looking to innovate workflows in the areas of construction, surveying, and utilities. It is important for these teams to understand how AR operates when planning to use this technology to assist with accomplishing everyday tasks. Trimble SiteVision is a user-friendly, AR system that can be used in various workflows to simplify data measurements and visualize models in the field. Wit...
Add Favorite
Navigating the Single Audit in the Era...
Right now, governments have a lot on their plates, from determining reopening policies and potentially transitioning workforces from telework back to their offices, to ensuring communities are staying safe and healthy. That’s why, when it comes to grants and funding, many agencies and departments may not be thinking of their long-term post-pandemic measurement and performance. Ensuring your agency is prepared for the single audit is more...
Add Favorite
Seton Hall University Modernizes Identi...
Seton Hall University Modernizes Identity with Okta At Okta, they focus on two main themes which are to protect campuses from security threats while making the user's experience simple and enjoyable. Higher education has taken great steps forward to automate identity management, but most colleges and universities are just starting their path to a true frictionless experience by eliminating passwords and incorporating device trust into their ac...
Add Favorite
Deliver Impressive Visual Messaging Wit...
Government agencies are struggling with ever-increasing content demands and a growing number of content collaborators teleworking. The best way forward is for agencies to create more content faster, through seamless collaboration, asset sharing, and access to essential design elements, no matter your location. The tools and services within Adobe InDesign empower creatives to collaborate to deliver impressive visual messaging, all while working...
Add Favorite
Red Hat Ansible Webinar Series: Automat...
View our on-demand webcast to see Red Hat's Dan Lemus and partner experts' insights on Red Hat Ansible, Red Hat's industry-leading platform for building enterprise-wide IT automation. Automate Networks to Accelerate Operations Erik Ellner, Director, State, Local & Education, Dynamic Systems The first step in digital transformation is automating your current processes, freeing your teams to focus more on innovation, and less on day-to-day t...
Add Favorite
Digital Document Experiences for Enhanc...
In the past few months, public sector agencies have been adjusting to new realities, such as collaborating with colleagues remotely instead of having in-person interactions. Adobe Document Cloud (DC) is revolutionizing the way that government agencies manage their day-to-day document processes with the world's leading PDF and electronic signature solutions.With Adobe Acrobat DC and Adobe Sign, agencies nationwide are empowered to modernize the...
Add Favorite
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Add Favorite
Investigations on the Darknet: Case Stu...
Andrew Lewman, the Executive Vice President of DarkOwl, will explore various case studies that involve utilizing information found on the darknet as a part of criminal investigations. Using these real-world, darknet-based examples that have been selected for an intelligence community-based audience, Andrew will walk-through examples of different methodologies law enforcement can use to de-anonymize threat actors, the different tools and approa...
Add Favorite
Tableau Learning Series: All Things Mapping
This foundational presentation will showcase the scope of Tableau. At the end of this presentation, the attendees will learn how easy it is to create maps with just a simple mouse click. Attend this viewing from Tableau to: Learn the core Tableau Mapping functionality Discover how Tableau reads data and assigns geographic roles to map data that is locked away in tables Understand how companies might have specific geographies that need mapping...
Add Favorite
Taking the Kinks Out of the Supply Chain

CANCELED

Supply chain management is critically important to running and maintaining an agency's IT systems, however it has not historically drawn much attention from the C-suite. Currently, many federal agencies use a manual process managed on spreadsheets which can lead to increased cost and risk.New directives have mandated that the Department of Defense must begin monitoring the supply chain within the Department's Risk Management Framework. These c...
Add Favorite
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Add Favorite
Webinar: Predict and Prevent with Splunk
Join us for a discussion on how you can leverage Splunk to visualize, monitor, and manage the performance of the key services that power your mission through real-time dashboards, reports, and alerts. Whether you're developing applications or running, securing, and auditing IT - Splunk can help you gain fast value from your data. During this informative webinar, we will discuss: How to leverage Splunk Enterprise, IT Service Intelligence (ITSI)...
Add Favorite
Deliver Engaging Virtual Learning Experiences
With many teachers and students preparing to conduct fall classes from home, the need to deliver interactive and engaging digital learning experiences is more important now than ever. Adobe Connect helps educators and learners stay connected through brandable, customizable, and persistent virtual classrooms. Join our complimentary webinar to uncover ways to create, maintain, and optimize your virtual classrooms. During this webinar, you will l...
Add Favorite
Elevate Productivity with the Adobe Cre...
With many government agencies going through unprecedented change, learning has become a front and center focus. Adobe is assisting public sector creatives to improve their skill and technique with the Adobe Creative Cloud (CC) Training Package, containing the best-in-class training content, all while teleworking. The Adobe CC Training Package platform supports agencies with a streamlined organization system, reducing the skill gap to manage a...
Add Favorite
QSMO and CDM Webinar
The Evolution of How Cybersecurity is Delivered as a Shared Service Join Palo Alto Networks for a virtual fireside chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) & Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies. Hear how...
Add Favorite
Why Mezzanine Helps Achieve the Best Si...
With teams distributed around the country, federal agencies need to collaborate effectively. Remote meetings are the new standard, and they require participants to share and view content in real-time. With current collaboration solutions, only one person can share content at a time, resulting in poor engagement and making situational awareness difficult. Oblong's Mezzanine solution allows you to share 10 live streams of information simultaneou...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
How to Write a Successful Government Gr...
Navigating the Single Audit Act and grants management during these times is challenging enough for grant professionals. However, for many governments, simply putting together a strong application for funding can be the most challenging part, especially for those new to grants administration. With more public-sector entities vying for competitive funding, it's important to assemble a strong application that can help your agency stand out from t...
Add Favorite
Splunk for Remote Contact Center Analytics
Many of you are using Splunk today to gain valuable insights to make data-driven decisions. The unprecedented times bring new challenges and Splunk provides the platform capabilities and the expertise to assist in ensuring continued availability and quality. We can help build on the tremendous work your teams already have in place today. Join Splunk and Carahsoft for a presentation on analytics specific to the help desk or call center. As you...
Add Favorite
Improve Public Access to Research Results
Research and development spending - including federal funding - has reached record highs and is continuing to grow. This growth is leaving agencies concerned about the administrative burden that results from federal mandates that require making publicly funded research outputs findable, accessible, interoperable and reusable. Last year the Government Accountability Office (GAO) published a study titled "Additional Action Needed to Improve Acc...
Add Favorite
Leverage Advanced Management and Securi...
With Adobe Document Cloud (DC), agencies across the nation are turning manual document processes into efficient digital ones. Adobe Acrobat DC and Adobe Sign empower agencies large and small to work with confidence, knowing that all PDFs and e-signature workflows are safe and sound through management features and security protocols -- all customizable to your organization's needs.Join our complimentary webinar to discover how your team can tak...
Add Favorite
Creating a Better Citizen Experience wi...
Natural Language Processing (NLP) is helping people communicate with machines, translate languages real-time and parse massive volumes of audio speech and written word unstructured data to uncover new insights to make better informed decisions. Across the federal government, from civilian agencies to the DoD and Intel Community, organizations are looking to AI and NLP to analyze raw data, expedite decision making and create a better citizen ex...
Add Favorite
Develop Stunning Websites with Ease
Today, agencies must take advantage of digital channels to create professional, well-designed communications that inform constituents and help them access services online. Many organizations are turning to Adobe XD and Adobe Experience Manager (AEM) Sites to help create landing pages, microsites, and websites that support their initiatives and relay vital information to the public. Join our complimentary webinar to learn how to create an immer...
Add Favorite
Analytics for the Next Stage of Crisis...
Most of our lives have drastically shifted this year. Along with the impact to family and health to consider, many government customers have a workplace that has shifted from face-to-face interactions to a remote environment. In these challenging times, the mission to learn from mass quantities of data and communicate with citizens is more important than ever. That data is nothing if we do not make it actionable and use it to provide improved...
Add Favorite
Bottom Up and Top Down: A Layered Appro...
Office 365 makes it easier than ever for your users to collaborate and meet your mission, but creating granular settings to police access to Teams and the sensitive data stored within them can be challenging for IT teams. This is especially true for government agencies with centralized Office 365 deployments where IT must effectively enforce Teams membership and configurations without impacting non-sensitive collaboration. Locking down your wo...
Add Favorite
Enhance Collaboration Experiences for P...
Adobe Sign enables agencies to cut the cost and hassle of manual, paper-based tasks by reducing the back-and-forth that typically accompanies document review and approval processes – providing users with more control and visibility over all document workflows. As Microsoft’s preferred e-signature solution, Adobe Sign works right from the Microsoft tab interface, so you can quickly and securely sign and send documents, contracts, an...
Add Favorite
Leverage Data Processing at the Edge fo...
Artificial intelligence (AI) and machine learning (ML) are becoming increasingly mission critical as the volume, variety, and velocity of data exceeds the cognitive capabilities of human operators. Join AI/ML experts from Red Hat and HPE as they discuss how to enable AI/ML as an effective real-time mission partner with their collaborative solution that makes AI-driven edge processing a reality. Data-driven applications like AI/ML must not be c...
Add Favorite
What You Need to Know About the Uniform...
The Office of Management and Budget just made a host of important updates to Uniform Grant Guidance (Title 2 CFR), which go into effect on November 12, 2020. Failure to comply with the latest requirements could mean audit findings and more headaches for governments who cannot afford additional delays during such a critical time. Join this complimentary webinar to learn: The latest updates to Uniform Grant Guidance Federal expectations and req...
Add Favorite
Captivating Video Editing with Adobe Pr...
Communicating with citizens and employees is a critical function of government agencies, from emergency response to educating the public on agency processes. The National Aeronautics and Space Administration (NASA) was able to produce a successful video series using the industry-leading video editing software, Adobe Premiere Pro. Video communication makes NASA's scientific content more approachable even when the subject matter is highly techni...
Add Favorite
Mitigating Business Email Compromise an...
Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware...
Add Favorite
Orchestration & Automation for Lockheed...
Security and IT Ops teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk gives you the full power of orchestration, automation, and response to executing actions in seconds, not hours. Join us to learn how Splunk Phantom can help your team achieve optimum security and IT operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage t...
Add Favorite
Rethink Your Approach to Cybersecurity
Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and ho...
Add Favorite
How Tribes Can Make the Most of Availab...
With nearly all COVID-19 relief funds distributed, many tribes may be left wondering where else they can go if they are in need of additional support.In this complimentary webinar, eCivis will cover the latest federal grant guidelines that tribes should be aware of, along with best practices to manage the influx of funding.Join to learn:The latest updates to Uniform Grant Guidance and how it affects tribesThe most recent grant programs and ava...
Add Favorite
Preconfigured Containers for Remote Dev...
Advances in cloud infrastructure and Kubernetes container orchestration have led to new tools for seamless communication and monitoring across academic institutions. Red Hat CodeReady Containers brings a preconfigured OpenShift cluster to your laptop or desktop for development and testing purposes in a remote IT environment. Join Red Hat on Thursday, October 1st, to learn how your school system can leverage the agility of containers in a light...
Add Favorite
Business Architecture: Strategy Executi...
Failure to execute strategy is the most significant management challenge facing public and private organizations in the 21st century. In fact, according to economist Michael Porter, more than 80% of organizations do not successfully execute their business strategies and in 70% of these cases, the reason is not the strategy itself, but bad execution. Most organizations have a strategy, but few are able to align strategic objectives and tactical...
Add Favorite
Take NASA's Security to the Next Level...
During these times, agency frontline workers, help desk, and support teams have gone remote. So, what has Splunk done to address what agencies can do to better facilitate personnel productivity for these teams who are charged with ensuring mission continuity, application security, and availability? Join us for a series of on-demand webinars that are designed to introduce you to the Splunk ecosystem and provide you with a deeper dive into how i...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. View our on-demand presentation and demo with Splunk and SGT on the power of Splunk Phantom's workflow engine. During the presen...
Add Favorite
Adobe Captivate Prime Workshop
Adobe and Carahsoft invite you to join these on-demand Technology Workshops! These virtual workshops feature sessions on how Adobe is accelerating digital transformation across federal, state, and local agencies for modern, efficient, and engaging digital experiences. Leave with exclusive how-tos, tips, and best practices that you can implement in your day-to-day at your organization for improved citizen and employee service delivery. Adobe Ca...
Add Favorite
Content Discovery in a COVID-19 World
piXserve is an enterprise-class software product that can enhance the productivity of law enforcement professionals. The software automatically indexes the contents of images/videos (archived or live sources) and helps users discover content of specific interest: objects, scenes, text strings, and people. The general use of face-masks due to the pandemic has made it more difficult for law enforcement professionals to generate and investigate l...
Add Favorite
Adobe Experience Makers DHS Workshop Series
Government agencies are rebuilding their digital experiences with citizens and employees in mind. Through innovative and reliable programs, Adobe has been assisting in these efforts by offering solutions that increase efficiency and deliver memorable experiences to citizens, all while protecting confidential data and information within the public sector.Join us for just one or all three of these on-demand webinars in this Department of Homelan...
Add Favorite
How to Scale and Modernize Agency Infra...
When migrating legacy, on-premise infrastructure to AWS Cloud, it is imperative for government agencies to implement new monitoring and alerting frameworks to reflect the nature of the new Cloud environment. This informative webinar will showcase how to seamlessly modernize, migrate and scale cloud infrastructure to deliver reliable, secure and user-friendly FedRAMP compliant citizen services. The presentation will include a government case st...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management. Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines vie...
Add Favorite
Tableau Enablement Series for the U.S....
The 38th Commandant of the Marine Corps states, “All of our investments in data science…are designed to unleash the incredible talent of the individual Marine.” Unleash your incredible talent with data in your mission area. From manning, training, and equipping the forces, to finance to installations and logistics, learn how to see and understand your data with Tableau. During this on-demand webinar, viewers will learn: How...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
AI, Machine Learning and Strengthening...
The federal government is dedicated to advancing U.S. leadership in the research, development and use of artificial intelligence (AI), to promote both national security and economic prosperity. Using AI to improve cybersecurity is a logical target for its implementation. It is especially important as the threat landscape continues to evolve. The World Economic Forum (WEF) reports that about 1.7 billion IoT devices have been installed to date i...
Add Favorite
Carahsoft DoDIIS Webinar Series 2022 -...
Orbital Insight and Carahsoft are excited to invite you to join us to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Discover how to improve maritime domain awareness (MDA) with Geospatial Intelligence. By leveraging advanced algorithms and Space-Based commercial sensor data, Orbital Insight's TerraScope provides mission-critical actionable insights.Register now t...
Add Favorite
Achieving Mission Success Using Search-...
Siren and Carahsoft are excited to invite you to join us in our DoDIIS 2022 webinar series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Electronic data sources in national security missions are increasingly more disparate, complex, and dependent on specific platforms. Intelligence analysts are overwhelmed by the number of existing and new data sources. Withou...
Add Favorite
DoDIIS 2022 Webinar Series: SecOps Auto...
VMware SaltStack SecOps is a VMware vRealize Automation add-on that delivers continuous compliance and vulnerability remediation with the power of SaltStack Config automation. With SaltStack SecOps, security and operations teams can work together to define a corporate IT security policy, scan systems against it, detect vulnerabilities and non-compliance issues, and actively remediate them - all from a single platform. Attendees of this webinar...
Add Favorite
DoDIIS 2022 Webinar Series: High Trust...
Anjuna and Carahsoft are excited to invite you to a webinar session leading up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Anjuna's Confidential Computing is a new breakthrough technology that shields data during runtime and creates high trust environments in the hybrid cloud. It leverages modern hardware to create a secure enclave in which da...
Add Favorite
DoDIIS 2022 Webinar Series: SolarWinds...
Participants will learn the following: Creating alerts that are actionable and provide information on what’s happening and how to fix the issue Removing false positives and false negatives from your alerts Correlating data from multiple modules to provide insight and reduce MTTR Tuning alerts that will get you to zero false positives
Add Favorite
DoDIIS 2022 Webinar Series: Mitigating...
Rubrik and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Cyber attacks strike every 11 seconds, leaving federal agencies and their data at risk. It's now a matter of when, not if, your agency will be impacted. Rubrik has introduced a new way of securing your agency's most important as...
Add Favorite
Carahsoft DoDIIS Webinar Series 2022 -...
SketchUp and Carahsoft are excited to invite you to join us in exploring how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. SketchUp is a fast and intuitive 3D modeler that allows you to combine project data in a single platform to ensure your team understands and builds the project efficiently.Register now to join our complimentary webinar to learn how to utilize project dat...
Add Favorite
Innovate. Adapt. Collaborate. DoDIIS 20...
Oracle and Carahsoft are excited to invite you to join us in our DoDIIS 2022 Webinar Series to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. What makes Oracle Cloud Infrastructure (OCI) different from other cloud services? It starts with Oracle's unique approach to building secure, performant, standards-based, and second-generation cloud services that utilize the...
Add Favorite
Using Alteryx to Accelerate Workday Stu...
Data conversion is vital to the successful deployment of Workday Student, yet it is often one of the biggest sources of project churn. Most higher education institutions have legacy data in a variety of unique sources and formats, and much of that data will need to be imported to Workday-specific templates that often require complex, non-traditional manipulation and formatting to be loaded into Workday. Attendees joined this session, hosted by...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Data Movement Across All Environments
Discover use cases in which Cloudera DataFlow (CDF) and Cloudera Data Platform (CDP)'s data in motion tools are being utilized by Department of Defense agencies to provide access to all observable data in real time and contextualize it with industry data for more informed decision-making with maximum efficiency and agility. Join us for a deep dive into Cloudera's data in motion features and how they leverage Apache NiFi to: Provide a m...
Add Favorite
Zero Trust & SecOps Automation: The Fut...
Department of Defense (DoD) agencies are taking concrete steps to transition to a zero-trust architecture to protect critical data and systems. Transitioning to a zero-trust architecture requires a fundamental reimagining of security operations centers (SOCs) and teams. SOCs have traditionally been structured around the role of the security operator, rather than the data and lacked both automation and DevOps practices. To establish a true zero...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Outplaying Cybercriminals: Modern Ranso...
In this on-demand webinar, Jeff Adams, National Director, Cloud Sales Public Sector, VMware, and Matt McGarth, Global AWS Sales Synergy Leader, VMware, led an informative discussion on Modern Ransomware Recovery Strategies. Download this webinar now and learn how VMware and Amazon Web Services GovCloud are jointly engineered secure, on-demand cloud service that brings VMware’s rich Software-Defined Data Center software to the AWS GovClou...
Add Favorite
Automate Evidence Collection: Manage Cy...
Is your GRC strategy enabling information security activities within your organization? Today's audit and compliance practices require time and resource-intensive information-gathering techniques that produce static and “point in time” results. Organizations can streamline information and evidence gathering by leveraging existing system data, creating objective evidence, maintaining compliance, and reducing risk. Join us for an inf...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
Addressing Cloud Security Vulnerabiliti...
Please join Orca Security and Carahsoft for an informative session on cloud security vulnerabilities in the education sector hosted by Devin Crear, Sr. Cloud Security Representative, Orca Security, and Patrick Burke, Sales Engineer, Orca Security. Educational institutions continue to be the highest victimized sector even when compared to healthcare technology, financial services, and manufacturing. A recent study in the education sector found...
Add Favorite
Section 508 Compliance: Innovative Stra...
In the digital era, Section 508 compliance is not only a regulatory necessity but a positive commitment. For federal agencies and government institutions, upholding the highest standards of web accessibility is key. Join Equally AI in this informative session as they dive into Section 508 compliance and discuss how their ChatGPT-powered product can enhance the digital experience you provide to the public. Introducing Flowy, a revolutionary pr...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
Add Favorite
CX Reimagined: How SMS Fosters Citizen...
Digitizing government services provides a unique opportunity to engage and serve the public. Prioritizing multi-channel outreach strategies has helped agencies to better engage with their vast audiences and underserved communities. Building an inclusive, transparent government starts with strategic communications that reach people where they are most. Governments benefit from creating thoughtful interactions that provide updates to enhance the...
Add Favorite
Cloud Success for Higher Ed Institution...
You and your Higher Ed team are invited for a webinar: Cloud Success for Higher Ed Institutions with HashiCorp Vault. On October 18th, Higher Ed institution professionals and industry experts host a webinar to discuss how HashiCorp Vault can update your cloud operating model and deliver new value to your students and faculty. Register now for insights on: Accelerating transitions: Education institutions must accelerate transitions to the cloud...
Add Favorite
Data Governance: Best Practices for Get...
Your one-stop-shop for a better understanding of data governance is here. Join Bobbi Caggianelli,Manager, Sales Engineering, at Collibra, as she outlines the need for data governance, how you can get started, and shares her first-hand experiences building a data governance program from scratch at a leading financial organization. Attendees of this webinar will learn: The need for Data Governance Where to start Culture change Collibra accelerat...
Add Favorite
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
Add Favorite
Elevate Your Data: Navigating the World...
As organizations share data both internally and externally, embedded analytics can make visualizations easy to share and understand. In an era where data reigns supreme, the ability to transform raw information into actionable insights is paramount. Embedded analytics has emerged as a game-changer, offering organizations the power to seamlessly integrate analytics into their applications and decision-making processes. During this webinar, atte...
Add Favorite
Carahsoft IACP Webinar 2023: Improving...
SaferWatch and Carahsoft are excited to invite you to join us subsequent to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. School violence and mental health issues have reached a crisis point in America. Statistically, over 50 children will be the victims of gun violence at school, excluding mass shooting events. In 2021, more than 1 in 5 students se...
Add Favorite
Mastering Cloud Security with Prisma Cloud
In today's digital landscape, security is essential for resource and application deployments. Whether it's in private data centers or the public cloud, the complexity of cloud-native environments presents unique challenges. Rapid developer movements, fully automated workflows, and segmented security teams can lead agencies to deploy applications on cloud-provisioned resources without adhering to proper security protocols. This oversight can re...
Add Favorite
Lunch & Learn: A Day in the Life of A D...
Cloud modernization and migration strategies can be complex for federal government teams trying to go it alone. Investing in solutions that enable IT modernization helps agencies improve scalability, enhance security and streamline constituent services. Join GitLab and AWS next month in Austin, TX at a two-hour lunch and learn to hear: How GitLab and AWS have aligned with the most recent CISA guidance for defending Continuous Integration/Cont...
Add Favorite
Freedom within Fences: Unlocking Data A...
Government agencies and higher education institutions struggle with data silos and timely analysis to uncover critical insights for their stakeholders. Join us for the upcoming webinar to learn how Strategic Innovation Group (SIG) can help government agencies and Higher Education institutions unlock data insights in a secure self service model by leveraging the combined power of Denodo and Alteryx. Government and Education institutions can acc...
Add Favorite
FedRAMP Rev 5 is a BIG DEAL Are You Ready?
The FedRAMP Authorization Act signed by the president in January 2023 made FedRAMP the law of the land. If you are a cloud services provider or software company that wants to sell to the U.S. federal government, it is critical that you have a current FedRAMP authorization. The good news is that FedRAMP Rev 5 with support for OSCAL (Open Security Controls Assessment Language) is now available and could make achieving FedRAMP faster, easier, and...
Add Favorite
Enabling Cloud Confidence
The biggest barrier to successful cloud adoption is often trust. Trust that a team won't cause a runaway cloud bill or run afoul of a compliance standard. Trust that an IT organization can deliver the support necessary to help a team get things done in the cloud. IT organizations in higher ED and state governments are similar when it comes to tackling cloud challenges: both have common roles and mandates around serving citizens and students co...
Add Favorite
Best Practices for Implementing Zero Tr...
As governments and educational institutions strive to meet public demands for access to data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to adopt a modern security approach like Zero Trust. During this webinar, you will hear from industry expert David Cagical, former CIO for the State of Wisconsin, and Matt Singleton,...
Add Favorite
Accelerating Your Zero Trust Architectu...
Join us for an exclusive Splunk webinar where we will provide an overview of the Zero Trust Framework and how you can leverage Splunk as a key component to your Zero Trust Architecture. Our experts will showcase the features, benefits, and capabilities of Splunk that will help you improve your organization’s security posture and accelerate your Zero Trust Architecture. During this webinar, attendees will: Gain a comprehensive understandi...
Add Favorite
CTO Sessions Fireside Chat: Edge-to-Clo...
The rise of cyber attacks signals the current approach to security isn’t working, and the industry must make a radical shift to ensure protection of its most important asset – data. Enter Zero Trust. A defined roadmap and lack of cohesive security solutions places the burden of technology integration and partner orchestration on the customer. This results in organizations implementing a self-defined approach made up of an assortme...
Add Favorite
Unlock the Potential of Healthy PDFs
PDFs have been the standard for file sharing since 1993. As standards continue to evolve, it’s important that those PDFs unlock efficiencies across the organization. However, not all PDFs are created consistently, and some may put you at risk of data exposure, exposure of business processes, and even fines resulting from noncompliant, inaccessible documents made available to a broad audience. Join our complimentary webinar to see how our...
Add Favorite
Managing Digital Design Workflows Made Simple
Delivering personalized customer experiences means creating more content than ever before, making increased content velocity crucial to successfully engaging your audience. With Adobe solutions, you can streamline processes, foster collaboration, and deliver seamless digital experiences. With Adobe Workfront and Adobe Experience Manager (AEM) Assets, your teams can easily review and approve drafts, deliver assets, and publish final products....
Add Favorite
Invest More Time Analyzing Data in Tabl...
Join Alteryx and Tableau to gain valuable insights into maximizing the potential of your data. Discover the synergy of using Alteryx and Tableau together to apply spatial analytics, boost accuracy, and make impactful decisions. By attending this webinar, attendees will learn: An easier and more agile method to prepare, blend, and visualize all data sources- as well as the ability to apply advanced predictive and spatial analytics without codin...
Add Favorite
Going Beyond Zero Trust Requirements
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice security for performance when bypassing security inspection, or performance for security by routing traffic through massiv...
Add Favorite
Redefining Police Evaluations: From Tic...
Guardian Score and Carahsoft are excited to invite you to join us after IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The traditional metrics for evaluating law enforcement performance have revolved around the volume of tickets issued, sidelining the essential component of the quality of officer-community interactions. However, in an age of increasin...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Time To Tableau
Tableau helps people see and understand data through visual analytics and enables more people in your enterprise to analyze data in an intuitive drag and drop interface. As the market-leading choice for modern business intelligence, the Tableau analytics platform makes it easier for people to explore and manage data, and faster to discover and share insights that can change businesses and the world. If your organization desires to provide self...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
Risk Intelligence: Proving Your Cyberse...
Cybercrime is evolving at the speed of innovation, sometimes outpacing the progress of cybersecurity. Cybercrime often has the advantage as it is highly motivated and not bound by the many required compliance and regulatory mandates that businesses face. Threat intelligence can be a useful ally, enriching the process of audit and assessment, and providing proof of security controls and policy enforcement that is required for security and comp...
Add Favorite
Build and Grow a GIS Program for Operat...
Where do you start when building a GIS program from scratch? Guadalupe-Blanco River Authority (GBRA), which provides stewardship for water resources in its ten-county district in south central Texas, invested in Esri ArcGIS Enterprise and field data collection applications at the start of their journey and added Nearmap to their tool set. Based on previous experience, GIS Administrator Mysti Downing knew Nearmap high-resolution imagery could p...
Add Favorite
Introduction to Alteryx
Please join us for our upcoming ‘Introduction to Alteryx’ webinar. Alteryx is a drag-and-drop, data prep and analytics platform that allows users of all types of backgrounds to easily connect to, manipulate and analyze their data. During this webinar, we will be introducing the basic data preparation and blending capabilities of Alteryx. Attend this Alteryx webinar and learn how to: Pull data in from any data source Join disparate...
Add Favorite
Tracking, Controlling, and Protecting U...
In this webinar, attendees will: Learn practical strategies to harness the value of unstructured data while remaining compliant and securing sensitive information Examine the latest techniques for cataloging, classifying, and applying governance policies to documents, emails, chats, and more Gain the knowledge and tools to master secure unstructured data management in these ever-changing environments of compliance and AI
Add Favorite
HPE & Qumulo Present Scale-Out File and...
Federal agencies are facing the new norm of managing data on-premises in addition to the increasing sprawl of data now emerging at the edge and in the cloud. Furthermore, the difficulty of managing data is compounded by challenges like remote teams or the advent of cloud services and businesses leveraging more of these due to increased agility and flexibility of options. Agencies then need to consider that data has gravity and must reside in...
Add Favorite
Transforming Authentication: From Execu...
The Executive Order M-22-09 mandates that all government agencies and contractors doing business with the government must implement phishing-resistant MFA for employees, contractors and citizens online applications by fiscal year end 2024. NIST, CISA, and NSA have recommended a FIDO-based approach as the best option. Together UberEther and Nok Nok provide the platform and expertise to address the executive order, and make it easy for you to ac...
Add Favorite
Carahsoft IACP Webinar 2023 Emerging Te...
Zebra and Carahsoft are excited to invite you to join us subsequent to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Advancements in technologies have enabled police agencies to find innovative ways to leverage new technologies to increase effectiveness and improve officer safety. With the right pairing of mobility and data communication technologies...
Add Favorite
The Future of Federal Agencies: Empower...
In the era of rapid innovation, Federal agencies must harness the transformative power of AI and Machine Learning (AI/ML) to augment human capabilities and drive decision-making. But with the ever-evolving nature of these technologies, it's no easy task to keep up! That's where ORI and H2O.ai come in - our cutting-edge AI/ML solutions are purpose-built to empower the greater workforce with easy-to-use automated tools. Join us for this informa...
Add Favorite
Solving Mission Critical Processes with...
With Atlassian's agile software suite, agencies can empower teams to work better together while directing workflows through a shared central hub. Join Atlassian experts on November 8th to explore: How tools like Jira Software and Confluence can be customized to develop unique and unified workflows across departments Ways Atlassian tools help agencies ensure security and compliance, overcome communication challenges, streamline incident respons...
Add Favorite
Enhancing Situational Awareness with AW...
Wickr and Carahsoft are excited to invite you to join us in the lead up to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. During this webinar, we will discuss advanced situational awareness capabilities for first responders, federal civilian agencies, the DoD, and more. Join Wickr and Carahsoft to learn: The benefits of pairing end-to-end encrypted co...
Add Favorite
Next-Gen Digital Solutions: Empowering...
ADF Solutions and Carahsoft are excited to invite you to join us subsequent to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Register now to explore how cutting-edge digital solutions are revolutionizing the law enforcement landscape. Specifically, you will learn about enhancing collaboration and communication within law enforcement agencies with the...
Add Favorite
How a U.S. County Solves Business Probl...
States, cities and counties across the United States trust Elastic, the industry leader in security, observability and search use cases, to solve their mission-critical problems with data-based insights.Elastic and Collin County took the virtual stage for a conversation exploring a real-world success story involving a single security use case that quickly expanded to other IT departments and personas. During the event, our featured speakers co...
Add Favorite
Closing Public Sector Security Gaps: An...
Join Carahsoft, GuidePoint and Invicti for a webinar on closing public sector security gaps. Spend an hour with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST). Mark Townsend, Invicti’s VP of Professional Services and Jean-Paul Bergeaux, GuidePoint’s Federal CTO, will be talking about an outside-in approach to application and API security testing and: Common challen...
Add Favorite
Managing Massive Amounts of Data in Tra...
Transportation projects involve a lot of information from various sources: environmental data, geospatial information, survey results, multi-disciplinary outputs, and more. Engineers, managers, and all other stakeholders must work with the most up-to-date and reliable data to achieve the best results. Furthermore, in a fast-paced world, flexibility and adaptability are critical. MicroStation simplifies this process by allowing engineers to att...
Add Favorite
The Future of Document Intelligence in...
Today, public sector agencies are faced with more physical and digital documents than ever before, and gaining access to information within them is a time-consuming and labor-intensive process that hinders efficiency and productivity. Government organizations are implementing technologies like digitization, automation, artificial intelligence (AI), and cloud-based systems to improve information access and data security, streamline processes, a...
Add Favorite
Improving Government Experiences: 4 Way...
A recent study cites that, “difficulty finding information and clarity of communications are the primary drivers of customer burden". A similar study cites, "39% of SLG leaders grade their department’s ability to deliver excellent, equitable, and secure citizen services an 'A'”. Alleviating customer burden can be challenging. Join Granicus for a complimentary webinar to hear from a government experience expert about how antic...
Add Favorite
DoDIIS Worldwide Webinar Series: Securi...
Babel Street and Carahsoft are excited to invite you to join us in the lead up to DoDIIS 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. In today's digital landscape, organizations and government agencies face a growing threat from insider risks, which can have far-reaching consequences for reputation, business continuity, loss of life, and national securi...
Add Favorite
Mobile Security Posture at the Departme...
Developing mobile applications is difficult and fraught with challenges. The solution? Finding the best app security testing abilities to help ensure mobile app development efforts are in line with Federal requirements and standards. NowSecure analyzes and continuously monitors mobile apps for security, privacy and compliance issues, scoring the risk with actionable information to help agencies protect themselves from mobile risks in their mob...
Add Favorite
Mayhem to Magic: How to Meet the Mandat...
In the last three years, the number of released cybersecurity mandates has doubled. From EO 14028, to BOD 23-01, 02, and (likely soon) 03, not to mention M-21-31 and M-22-09, these mandates are rarely backed with funding or staffing to help meet the reporting requirements. Rarely do agencies have the tools to report outcomes easily and in a trustworthy way. The result? Many agency CISOs and CIOs are left to fulfill an onslaught of mandates wi...
Add Favorite
Smarter Tenant Screening: How Leveragin...
Equifax has been hard at work to deliver more comprehensive background verification services to meet the needs of government housing authorities and housing assistance programs. Starting in November, when you order The Work Number™, the gold standard in income and employment verifications, you also have the ability to order a separate, new criminal data verifications solution: Smart Screen™ Advanced - TenantCheck Government. Join u...
Add Favorite
Operating with Continuous Compliance
Why is it important to move from reactive compliance to always compliant? Traditional approaches to ensuring standards compliance, including federal regulations like FIPS 140-2, FISMA and FedRAMP, involve slow, manual post-build security scanning as part of the authority-to-operate process. With different gates of approval, these processes catch compliance and security defects too late, creating rework and sacrificing operational agility. Prog...
Add Favorite
Democracy Goes Digital: The One Thing T...
During this webinar, attendees will learn: How to detect both internal and external actors in voting systems Novel approaches to threat detection and response that can be deployed easily The detailed threat intelligence you will receive in real time about actors threatening election systems
Add Favorite
Successfully Navigate the Convergence o...
In this webinar, attendees will learn: How to overcome internal control siloes and the increasing Importance of Cross-Application GRC Overcoming challenges posed by elevated or privileged access requirements Why Continuous Controls Monitoring should be at the heart of your GRC strategy Best practices for evaluation solutions
Add Favorite
MAXimize Your Creative and Document Workflows
At this year's Adobe MAX Creativity Conference, guests got the inside scoop into the future of Adobe Creative Cloud. Attendees witnessed captivating demonstrations on new updates to your favorite applications, as well as brand new rollouts such as Adobe Firefly Artificial Intelligence (AI). Adobe has launched innovations across Creative Cloud applications, with Document Cloud integrations that will accelerate content creation at the speed of g...
Add Favorite
MOSAICS and the Future of Industrial Cy...
As the vulnerability of industrial control systems (ICS) to cyberattacks continues to have a clear impact on infrastructure security, emerging security solutions are essential to the future of industrial cybersecurity. MOSAICS – More Operational Situational Awareness for Industrial Control Systems – is the working prototype demonstrating an integrated capability for ICS operational defense. This roundtable discussion pulls together...
Add Favorite
Pain-free, Controlled Technology Migrat...
Migrating cloud services, databases, and APIs can mean using an all-or-nothing approach that is risky, costly and time-consuming, putting your agency at risk of infrastructure routing complexities and user experience challenges that can slow down or even halt agency modernization efforts. Join LaunchDarkly online on November 14 to discover better, safer ways to migrate your agency’s tech stack and turbocharge your agency’s moderniz...
Add Favorite
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
Add Favorite
DevSecOps: A Shift Left for Security an...
The success of federal agencies hinges on modernization. As such, a growing number of government programs are adopting DevSecOps methodologies but struggle to harness its full potential. With Atlassian's Jira Software and Confluence, agencies can make the most of their adoption by streamlining workflows and boosting agility. Join Atlassian experts on November 15th to explore: Use cases on federal agencies modernizing their systems using A...
Add Favorite
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Add Favorite
Showcasing the Power of a Unified Secur...
Join us on November 15th for this CrowdStrike webinar where we will take a deeper dive into the benefits LogScale can provide security experts.
Add Favorite
The Industry's First Unified Observabil...
Join Riverbed and Carahsoft for a live webinar that breaks down how organizations can keep pace with modernization initiatives and technology advancements. By taking a step back and evaluating your IT infrastructure, you can achieve Unified Observability. During this webinar, Riverbed's VP of Americas West, Charlie Bollom, will explain: The different levels of IT maturity along the Unified Observability Journey The difference between reactive,...
Add Favorite
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
Add Favorite
CTO Sessions: A Guide to BYOK and HYOK...
Cloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption operations. Cloud Service Providers therefore offer Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK) services to enable customer control of the keys used to encrypt their data. Customer control of the keys allows for the separation, creation, ownership and control, including revocation, of encr...
Add Favorite
CTO SESSIONS: Everything You Need to Kn...
Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch attacks. The Federal Zero Trust Strategy prioritizes defense against sophisticated phishing and directs agencies to consolidate identity systems so that protections and monitoring can be consistently applied. Multi-factor authentication (MFA) plays a critical part of the Government’s strat...
Add Favorite
Transparency and Accountability: Buildi...
Trust and legitimacy, perceived and real, are as important to the delivery of police service as the ability to clear calls. Modern Evidence-Based Policing (EBP) services have embraced open data and accountable business intelligence systems as critical to these goals. The act of being transparent is important but the ability to invite the community to a conversation supported by a shared understanding of the problem, is the key to democratic po...
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. The overview of the platform focused on: Discovering and managing an accurate, unified and c...
Add Favorite
Bridging the Gap: WIFI on School Buses
Register today for Fortinet's E-Rate webinar where our IT Education experts will discuss a groundbreaking announcement from the FCC. WIFI on school buses is now E-Rate funding eligible, and your partners at Fortinet are here to guide you through the opportunities this presents for your school. Fortinet’s IT Education experts are dedicated to helping your organization access crucial funding, enhancing, and safeguarding your technology inf...
Add Favorite
Atlassian Team Tour: Government 2024
Atlassian is transforming government teamwork with tailored solutions to meet your agency's security and compliance needs. Enhance service delivery, responsiveness and mission success with insights from this year’s Team Tour: Government which was hosted on March 6, 2024 in Washington, D.C. Access all recordings on-demand, including keynotes and breakout sessions, and discover: Actionable tips to break down silos so your teams can increas...
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
SecureWorld Healthcare
Don't miss the SecureWorld Healthcare virtual conference on May 1, 2024, to connect and learn with other cybersecurity professionals in your field! The agenda offers 12 educational sessions and 5 CPE credits.
Add Favorite
Back to Search Begin New Search