Back to Search Begin New Search Save Search Auto-Notify
Ensuring a Secure Infrastructure for Em...
As IT needs have significantly increased, so has the requirement of a secure infrastructure to support the sudden world of remote living for government agencies and the communities they serve. States, cities and counties have transitioned most employees to remote work, and are now taking a closer look at preventing cyberattacks as workers log in from their homes and personal devices. Not to mention, the increased traffic to citizen portals als...
Add Favorite
Splunk: Driving Patient Privacy
Patient privacy is an ever-growing concern within our medical community. Join Splunk, True Zero Technologies, and Carahsoft to learn how Splunk uses data from all data sources to identify breach or leak incidents concerning ePHI.During this webinar, we will discuss how:Proactive measures and real time response to security breaches or unauthorized access attempts help ensure privacy of patient informationImplementing these protective measures h...
Add Favorite
5 Steps to Comprehensive Data and Threa...
Many state and local government entities face increasingly complex challenges when it comes to keeping important data secure. Today there are more users, devices, applications, and data outside the organizational datacenter than inside. This network inversion introduces new blind spots, leaving agencies vulnerable to a new crop of cloud-enabled and credential-based attacks. Please join Netskope for a webinar to discuss how Netskope has partner...
Add Favorite
IT Service Delivery for Distributed Wor...
Join Splunk, Forescout, and Alchemy Global to see how our solution will secure IT service delivery for distributed workforce enablement. With an unprecedented growth in remote connections, our workforce faces a new host of logistical constraints and a larger attack surface than ever before.Before we build an effective remote workforce program, we must ask these questions:How many endpoints are connected at any given time?Are those endpoints co...
Add Favorite
Collective Defense and the Global Cyber...
Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.Combined with the current work environment and the emergence of new threat vectors from key adversaries, we are entering a more dangerous cyber threat landscape than ever...
Add Favorite
QSMO and CDM Webinar
The Evolution of How Cybersecurity is Delivered as a Shared Service Join Palo Alto Networks for a virtual fireside chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) & Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies. Hear how...
Add Favorite
Navigating the BootHole Mitigation Process
Eclypsium researchers recently disclosed an arbitrary code execution vulnerability in the GRUB2 bootloader that can bypass Unified Extensible Firmware Interface (UEFI) and OS Secure Boot, impacting other OS defenses. In this webinar, John Loucaides, VP of Research & Development at Eclypsium, will help government agencies understand how to navigate the complex process of mitigating the GRUB2 BootHole vulnerability - without inadvertently ma...
Add Favorite
Dynamic Cloud Webinar
Recent events highlight the critical need for always-on, cloud-delivered access for distributed user communities - distance learning, remote workers, and research to name a few. In such situations, the cost of speeding delivery can lead to concessions or oversights in the security posture. As dynamic cloud environments become more common in government and educational organizations, IT teams must understand their responsibilities in the Shared...
Add Favorite
True Cybercrime Stories
Join Trustwave on Wednesday, September 2nd for a live webinar. Whether you are a twenty-year veteran or have just started your journey into the world of cybersecurity, you will find this remarkable event entertaining and very beneficial. We have assembled a small handful of interesting, real-world cybercrime stories told by actual cyber investigators. Each story a cautionary tale on a grand scale!
Add Favorite
Essential App Protect Workshop
Join F5 Networks and Carahsoft for a workshop where you will learn how to remove the complexity from safeguarding your applications with F5's Essential App Protect Service - a feature-rich, checkbox-simple SaaS security for web apps deployed in any cloud. Essential App Protect shields your web-facing apps, as a service, without sacrificing speed and agility. Within minutes of activation, your app will have out-of-the-box protection against com...
Add Favorite
Back to Search Begin New Search