Back to Search Begin New Search Save Search Auto-Notify
Stronger Authentication With RSA SecurI...
Strong identity assurance rests on more than just strong authentication, it requires a context-based approach that links authentication and access policy to determine the appropriate level of authentication, while minimizing the impact on the end-user experience. View our complimentary on-demand webcast, and learn how RSA SecurID Access can help your agency: Enable centralized access to SaaS, web, and on-premises applications Extend the numbe...
March 8, 2017
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
RSA Public Sector Day
Register today to join your peers in public service, government IT luminaries, and RSA executives, for engaging government-specific sessions, high-profile keynotes, and the premier public sector networking event of the conference. RSA Public Sector Day is offered at no cost, for Federal, State, and Local government employees. Attendees of RSA Public Sector Day must obtain a RSA Conference pass to be eligible to attend. An expo pass for RSA Con...
February 13, 2017
Organizer: The RSA Government Team at Carahsoft Technology
Location: San Francisco, CA
Add Favorite
Enabling Rapid Data-Driven Security Dec...
Organizations have deployed multiple scanners that identify vulnerabilities but produce too much data to actually be helpful in managing security risk. Many organizations have implemented vulnerability scanning solely for compliance purposes and receive limited added value effectiveness of this fundamental control. Missed vulnerabilities, outstanding issues, and lack of clarity of ownership of vulnerabilities leave serious, ongoing holes in th...
December 15, 2016
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Identity Assurance with RSA SecurID Access
During this on-demand webcast you will learn how RSA SecurID Access can help your agency: Enable centralized access to SaaS, web, and on-premises applications Extend the number of authentication options available to end-users to include not only SecurID tokens, but also mobile OTP, fingerprint, eyeprint, and FIDO tokens Map initial, as well as step-up authentication, policies to individual applications Automatically invoke step-up authenticat...
November 10, 2016
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Combatting Advanced Threats With RSA Ne...
Federal security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue their advance by using sophisticated techniques to infiltrate government systems. Tools, Tactics, and Procedures (TTPs) are the ways attackers work to target, exploit, and compromise organizations. Recently, attacker TTPs have become more sophisticated, mimicking normal Federal...
October 6, 2016
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Active Incident Response for Today's Ad...
It’s no secret that effective and timely incident response increases the chance of success in the face of sophisticated cyber attacks, when time is not on your side. This webcast will reveal how, with careful planning and the right resources in place, you can better detect and more quickly respond to a suspected security incident. Join this webcast and learn: The four key areas to focus on to be amply prepared for a major incident The d...
December 9, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Security Operation Center Management: T...
RSA Archer Security Operations Management (SecOps) enables enterprises to seamlessly orchestrate people, processes, and technology to effectively detect and respond to security incidents. Architected and designed by benchmarking world-class Security Operations Centers, our software solution is SOC process and persona focused. RSA Archer SecOps enables organizations to manage the overall incident response, breach response, and SOC program that...
May 19, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Taking FISMA Compliance to the "Ongoing...
As a federal Information Assurance (IA) professional, you must comply with FISMA, but you also strive to integrate operational security data into your compliance activities, make true risk-based decisions using current and accurate metrics, and enhance the ROI of the scanners and sensors that you own. The threats are real and the risks are great, so it’s critical to have a highly efficient and effective IA program in place. Automation an...
March 24, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Combatting Advanced Persistent Threats:...
Enterprises are constantly centralizing incident-response teams to detect and respond to Advanced Persistent Threats (APTs). As customers implement Standard Occupational Classification System (SOCs), a framework is required to seamlessly orchestrate and automate the multiple roles, processes, and technologies to keep up with APT’s and other threats in a highly cost efficient and effective manner. View our on-demand webcast to learn how R...
August 12, 2014
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search