Back to Search Begin New Search Save Search Auto-Notify
Bridging the Gaps of Cybersecurity
With 70% of government breaches caused by phishing, and the public sector being the second most victimized industry, the importance of aligning cybersecurity priorities is even more critical to winning the war against phishing. View this on-demand webinar to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions and learn expert insights on how you can protect your agency by combining the po...
Add Favorite
Unlocking Data to Drive Smarter and Saf...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability into a $100M weapon system as you do for a $500 laptop? Planes, tanks, and other weapon systems are composed of thousands...
Add Favorite
Google Cloud Work Safer Webinar with Cr...
In this on-demand webinar, you will learn about: Adversaries targeting public sector organizations and how to prepare to stop them How Google Cloud and CrowdStrike's integrated solutions provide proactive automation for threat hunting with shared intelligence across endpoints and workloads for a defense-in-depth infrastructure New strategies to achieve the highest levels of visibility, simplicity, and control to build stronger cybersecurity de...
Add Favorite
BeyondTrust FSI Roundtable Webinar
The Office of Management and Budget issued its guidance in January on meeting the requirements for agency networks to implement a Zero Trust architecture strategy. The mandate seeks to defend against sophisticated penetrations by adversaries, emphasizing identity management and access controls are key components of the strategies. Taken together, identity and access controls mean that privileged access management (PAM) is essential. Federal ag...
Add Favorite
2022 Red Hat Security Symposium On Demand
Join our on-demand Security Symposium webinar series, where IT security professionals can learn from Red Hat® and Intel security experts, partners, and peers to solve security issues together as a community. This Security Symposium is an on-demand, six-session webinar series with presentations from experts discussing hybrid cloud security challenges that organizations face and solutions to tackle these challenges. During this series, we...
Add Favorite
The Digital Naval Enterpise: Accelerati...
Rapid technological advances by near-peer adversaries have accelerated the need to innovate traditional cybersecurity and network approaches. This need is intensified by the massive shift to distributed workforces and distributed data. Now more than ever, Sailors, Marines, and the Naval Enterprise need the ability to securely access data from any device, any network, and any location. View this on-demand webinar from Zscaler and KBR where you...
Add Favorite
Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
Add Favorite
Adversary Emulation at Scale with Rebel...
Rebellion Defense and Carahsoft invited you to learn how your agency can deploy automated adversary emulation with Nova and uncover the security weaknesses that have the greatest real-world consequence for your mission. Experts discussed how you can: Leverage advanced automation to emulate adversary tactics, techniques, and procedures (TTPs) at scale. Gain a contextualized understanding of how cyber defenses truly stand against real-world atta...
Add Favorite
How to Prepare for CMMC Mandate
RegScale and Carahsoft hosted this webinar to help you and your cybersecurity team prepare for DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. Under the CMMC program, all Defense Industrial Base (DIB) contractors will be required to implement certain cybersecurity protection standards and perform self-assessments or obtain third-party certification as a condition of DoD contract award to better protect controlle...
Add Favorite
Ensure Cyber Threat Defense with Zero T...
You think you have your Zero Trust framework dialed in, but the unimaginable happens. Bad actors have penetrated your agency’s perimeter, network, and endpoint security solutions, leaving you with your last layer of defense - the data layer itself. Join Rubrik and Carahsoft for an on-demand webinar to fortify your defenses against cyber threats. Built to withstand pervasive cyber threats, Rubrik's Zero Trust data security ensures resilie...
Add Favorite
Back to Search Begin New Search