249 past events found
Back to Search Begin New Search Save Search Auto-Notify
Application Security from the Cloud wit...
As your agency increasingly engages constituents, employees, and contractors through web and IP-based applications, web application security must be a critical priority. Attackers know that disrupting web applications can result in significant loss of important and sensitive government data. To prepare for the inevitable attacks, you need application security solutions that deliver fast and effective protection in order to safeguard your infra...
Add Favorite
F5 Networks Privileged User Authentication
Join F5 Networks for a webinar where we will discuss how SSH and Web management interfaces for routers, switches, secure telephony administration interfaces, firewall, IDS/IPS, DLP interfaces, storage array interfaces, VDI, and more, can be CAC/PIV/Smart Card enabled using F5 Privileged User Authentication (PUA). Attendees of this webinar will learn: How the F5 PUA provides Single Sign On (SSO) to all administration interfaces, infrastructure...
Add Favorite
How to Boost Your VM Performance
Join the virtualization experts from Condusiv Technologies with over 30 years of I/O optimization expertise on February 6th for a complimentary webinar to learn more about how this solution can help you boost Virtual Machine (VM) performance without adding any new hardware.Hear about the two big silent killers of VM performance and why your heaviest workloads like those running on SQL, Oracle, Exchange, ERP, etc are only processing HALF the th...
Add Favorite
Understanding Incoterms 2010
International Commercial Terms, or Incoterms®, are commercial terms or rules that define the seller's and buyer's responsibilities for the delivery of goods under a sales contract. They are published by the International Chamber of Commerce (ICC). Incoterms® are widely used in commercial transactions but often ignored until they are needed. Usually they are incorrectly used and in some cases taken for granted until a shipment goes wro...
Add Favorite
Outplaying Cybercriminals: Modern Ranso...
In this on-demand webinar, Jeff Adams, National Director, Cloud Sales Public Sector, VMware, and Matt McGarth, Global AWS Sales Synergy Leader, VMware, led an informative discussion on Modern Ransomware Recovery Strategies. Download this webinar now and learn how VMware and Amazon Web Services GovCloud are jointly engineered secure, on-demand cloud service that brings VMware’s rich Software-Defined Data Center software to the AWS GovClou...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Using Alteryx to Accelerate Workday Stu...
Data conversion is vital to the successful deployment of Workday Student, yet it is often one of the biggest sources of project churn. Most higher education institutions have legacy data in a variety of unique sources and formats, and much of that data will need to be imported to Workday-specific templates that often require complex, non-traditional manipulation and formatting to be loaded into Workday. Attendees joined this session, hosted by...
Add Favorite
Webinar: The State of the Practice of D...
This course will survey dam breach analysis methods currently in use. Difference in methodology, analysis steps, assumptions and results will be described. Specifically, the course will cover hydrologic routing, 1D hydraulic routing, and 2D hydraulic routing. Features of popular software will be summarized, and future advances will be highlighted. What are the five takeaways/learning objectives attendees will receive from this course: What met...
Add Favorite
Google Cloud 2020 Webinar Series: Setti...
Join Google Cloud and Carahsoft to learn how to turn data into actionable insights using a comprehensive 'serverless' data analytics and machine learning platform. Realize the benefits of 'no-ops', integrated, end-to-end data analytics that eliminates conventional limitations on scale, performance, and cost efficiency. During this on demand webinar, you will learn: Google's Data Analytics Platform Data Discovery capabilities in Google Cloud Pl...
Add Favorite
Back to Search Begin New Search