249 past events found
Back to Search Begin New Search Save Search Auto-Notify
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
Add Favorite
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
Add Favorite
Mitigating Your Data Complexity
Too many organizations struggle with the complexity of their own data. An extensive 50-60 percent of enterprise data is "dark" and serves no valuable insight, according to IBM and Veritas research – don't let your agency be held back by that same confusion. You need to be able to tackle business challenges without worrying about the complexity of your IT environment. Join us for a live webinar on the necessity of abstracting complexity f...
Add Favorite
Security Transformed with Zero Trust
High-profile breaches involving "trusted" insiders showcases the fact that trust is something malicious actors can exploit to their advantage. John Kindervag, Palo Alto Networks Field CTO, created Zero Trust on the principle of "never trust, always verify," to help organizations effectively segment their networks and relieve any doubts of insider attacks. In recent years, Zero Trust has evolved to become a strategic Cybersecurity initiative th...
Add Favorite
Google Cloud 2020 Webinar Series: Strat...
Join Google Cloud and Carahsoft for a webinar to receive a roadmap of database migration options and strategies for migrating to GCP. Moving your existing on-prem workload can be challenging when your agency doesn't have a clear understanding of how to move its databases with minimum risk. Register and attend to learn how to run a comprehensive assessment of existing on-prem environments and provide a list of criteria for decision making, a ro...
Add Favorite
Adobe Digital Learning Seminar in San A...
Every day you undertake the challenge of training your workforce to maintain compliance, work skills, and relevance, and with all the resources you put into training, you want to make sure the message sticks. Join us in San Antonio to discover how understanding the modern adult learner and identifying their style of learning will affect your content mediums and delivery styles. Whether you teach in-person, online, or in a blended learning env...
Add Favorite
Google Cloud 2020 Webinar Series: Janua...
The IT infrastructure of many government agencies is largely comprised of Virtual Machines. As CIOs begin to implement their Cloud adoption strategies, it is imperative that their teams understand the processes and tools available for moving these workloads to the Cloud. This webinar will cover the lift and shift approach to migration and how Google can help accelerate the path to the Cloud for Linux and Windows Virtual Machines. During this w...
Add Favorite
Next Level Security with Infoblox
Security teams know painfully well that it takes too long from the time a breach happens to being able to identify what happened and how. Rather than investing in another security tool, what you need is a smarter and more efficient way to manage and secure your entire network. The Infoblox security solution is a platform designed from the ground up to protect enterprise networks, users and devices from becoming victims of today's sophisticated...
Add Favorite
Adopt a People-Centric Approach to Security
Security leaders at government agencies have a complex workforce to protect. Today, agency employees, contractors, partners, and even citizens all need access to applications and resources from a variety of different locations, including at work, at home, or from a local coffee shop. The rise of cloud and mobile devices has catalyzed rethinking modern security, but amidst this complexity, one consistency remains: credential-harvesting is the m...
Add Favorite
Microsoft Teams and Security Solutions...
Join McAfee and Carahsoft to learn how McAfee can help your organization move to the cloud with confidence by protecting critical data. During this on demand webcast, you will learn more about how McAfee can help with: Monitoring activity locally on each database server and by altering or terminating malicious behavior in real time Virtual patching that applies vulnerability-specific countermeasures and fixes misconfigurations, improving the s...
Add Favorite
Back to Search Begin New Search