Back to Search Begin New Search Save Search Auto-Notify
The Future of Cloud in 2027: From Techn...
As cloud computing evolves from technology enabler to business disruptor, IT leaders must ensure they understand their organization’s business strategy. Only then can they seek opportunities to leverage new and emerging cloud capabilities to accelerate that strategy. This free webinar reveals Gartner’s top predictions for where cloud computing will be by 2027, and explores how these predictions will shape your cloud value propositi...
November 15, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Intelligent Transportation: Cybersecuri...
Emerging technologies and Internet of Things (IoT) sensors are ushering in a new era for transportation – and increasing concerns about cybersecurity and data privacy. As our transit networks become increasingly data-rich environments – with hundreds of thousands (or millions) of connected sensors and endpoints – it becomes crucial to secure data at the point of production. And protecting personally identifiable information...
November 15, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
November 15, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Cyber-SCRM Educational Training Series
You are invited to join the Cybersecurity Supply Chain Risk Management (C-SCRM) Acquisition Community of Practice (ACoP). Since the launch of the C-SCRM ACoP, GSA and CISA have been co-leading an effort to broaden the level of awareness and develop agency maturity in the areas of acquisitions, supply chain risk management, and cybersecurity across the Federal Government for information communication technology and services (ICTS). Why Should Y...
November 15, 2022
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
Insider Threats for Systems Integrators...
Join the Proofpoint team and dive into the Insider Threats impacting your organization and new Federal requirements for the Federal Systems Integrator community. Vulnerable employees, bad actors, and cybercriminals continue to threaten national security, but with the right cybersecurity solutions your organization can prevent and protect against insider threats. Learn how Proofpoint can provide deeper insight and mitigation strategies. In this...
November 15, 2022
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
SANS DFIRCON 2022: Keynote - What Makes...
Staying current in DFIR is more than just doing the job daily. It takes work. Those who put forward an effort to research, train and share seem to carve a special place for themselves in this community. Do you have what it takes? Do you want to do more in forensics and with your education? This talk will walk you through lessons learned and methods to get the most out of DFIR and enhance your daily work.
November 15, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
Reporting Requirements Made Easy with D...
State and local governments are expected to deliver projects that adhere to regulatory compliances, Diversity, Equity and Inclusion requirements and other standards. New funding opportunities, such as those made possible by the Infrastructure Investment and Jobs Act also require governments to meet different equity markers. Agencies need to streamline the tracking and reporting of performance metrics to take full advantage of future financing...
November 15, 2022
Organizer: Government Technology
Location: Webcast
Add Favorite
Keeping the Government Workforce Produc...
The hybrid workforce and direct-to-app architectures have rendered legacy security architectures obsolete while dramatically increasing our attack surface. Cloud based security with ZTNA 1.0 approaches have emerged as potential solutions, but they only solve part of the problem, failing to adequately secure today's work-from-anywhere users and direct-to-app architectures.This session will explain a modern approach to ZTNA and how it is imperat...
November 15, 2022
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
November 15, 2022
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Directive M-19-21: Record Digitization
Directive M-19-21 is driving Federal agencies to digitize their hardcopy records and shut down their records storage facilities. Join our two-part Archive360 webinar series and learn what your agency needs to do to reduce the costs and risks of digitizing and managing paper records. Part 1: Directive M-19-21: Next Steps - What To Consider After Digitizing Record Keeping Since Directive M-19-21's announcement, the big question is: how to store...
November 15, 2022
Organizer: Archive360 Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search