Back to Search Begin New Search Save Search Auto-Notify
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Attendees joined for a strategic session that delves into the essentials of the Risk Managemen...
Add Favorite
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Attendees joined ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning C...
Add Favorite
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees learned how to: Step up their Tableau security game: Attendees learned how to leverage Tableau's built-in features to secure their analy...
Add Favorite
Out of Sight Out of Control: Asset Inte...
Asset visibility and control is an unsolved challenge, with a huge amount of the attack surface being assets that are un-agentable or traditionally manageable. Allow Armis and Semperis to enlighten you on how organizations have huge blind spots that lead to unknown and unquantifiable cyber risk. During this complimentary webinar, attendees learned about: Examples of unmanaged and IoT devices that can’t be protected by traditional systems...
Add Favorite
The Evolution of ATO and Workflows that...
Keeping in line with the Agile manifesto, Secure Development of software within the Government Tech community is improving as we gain direct experience through the process of its development. Secure Development Lifecycles, the addition of "Sec" to form DevSecOps and the molding of traditional Authority to Operate (ATO) to the application of modern continuous integration/continuous delivery operations has birthed a GovTech community pushing the...
Add Favorite
Leveraging Practical Tools to Manage Op...
View our on-demand webinar for an insightful roundtable discussion where we dove into the complex landscape of opioid abatement amidst the ongoing crisis. With few guardrails on how settlement funds can be spent, stakeholders need tools and strategies to ensure effective use of funds and to measure what is working and what is not. Key topics included: Understanding the Landscape: Explore the current challenges faced by counties and states in m...
Add Favorite
Unleashing Data Insights: MySQL HeatWav...
In today's rapidly evolving business landscape, the ability to extract actionable insights from data is paramount to staying ahead of the curve. That's why MySQL and Carahsoft hosted an exclusive session dedicated to MySQL HeatWave—an informative webinar on how to supercharge your Tableau and MySQL performance and unlock new possibilities for data-driven decision-making. Access the recording to discover the unparalleled capabilities of...
Add Favorite
Optimizing Performance and Security in...
On Thursday, May 30, 2024, an expansive panel of industry experts from Heimdall Data, Eon Collective and VMware by Broadcom gathered to present an enlightening event focused on critical aspects of cybersecurity, tailored specifically for IT personnel. This event was hosted by Carahsoft in collaboration with Amazon Web Services (AWS). Click to download a copy of the slide decks presented.
Add Favorite
Harnessing the Full Potential of Contin...
CloudBees CI is a powerful enterprise solution for Continuous Integration (CI) that leverages the flexible and robust Jenkins engine. With its added features, this solution significantly boosts scalability, manageability and performance for organizations utilizing Jenkins. Attendees joined CloudBees experts for a webinar and learned how Jenkins and CloudBees CI compare against each other and delve deeper into the best practices for: Software d...
Add Favorite
AI and State-Sponsored Espionage - A We...
Attendees joined Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats.AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern.Recent trends indicate that cyber espionage is on the rise, and the employment o...
Add Favorite
Back to Search Begin New Search