424 webcasts found
+ 4057 past events found
Back to Search Begin New Search Save Search Auto-Notify
Surveillance Off-Grid: Deploying Hybrid...
New surveillance technology and smart analytics allow technology to supplement and sometimes even replace physical security guards. Deploying this technology has the potential to make a facility much more secure, but security experts have a tendency to neglect the most vulnerable areas because of local power or connectivity issues. In a world where the power grid is increasingly unreliable, we'll explore new technology solutions that allow for...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Prevent & Detect Business Email Comprom...
BEC attacks on city, state, local governments and educational institutions is a major cyber threat hitting organizations today. Across the nation, these attacks present a significant and unique challenge for resource-strapped local governments and educational entities. The FBI reports that 51% of all Cyber losses originate with BEC. Security leaders need strategies that help mitigate these common attacks and get ahead of threat actors today -...
Add Favorite
Midwest Roundtable Series: Google Security
2020 introduced complex challenges for enterprise IT environments. Data volumes have grown, attacker techniques have become complex yet more subtle, and existing detection and analytics tools struggle to keep up. Join Google Cloud and Carahsoft on Wednesday, August 25th for this interactive session to hear Google Cloud's approach to modernizing and transforming the SOC to maintain velocity with the ever-evolving climate of security and creativ...
Add Favorite
Learn How 5 Steps Can Mitigate Ransomwa...
According to Ponemon, 88% of public sector organizations have experienced at least one cyber-attack in the past two years. Why? This is because public sector organizations offer an abundance of sensitive data for hackers including social security numbers, confidential health and finance records, and valuable intellectual property. The number of hacking, ransomware and cybercrime events continues to grow. Are you prepared? Join Otava, Veeam, an...
Add Favorite
Upskilling and Reskilling Healthcare Workers
Continuous education in healthcare is key. Rapid advances and changes mean practitioners need to keep pace with training and new information in order to best serve patients. With the help of eLearning, healthcare professionals can learn and complete trainings virtually on their time, and not take time spent in a classroom away from their patients. Join our complimentary webinar to learn how to quickly and effectively reskill and upskill your e...
Add Favorite
Innovative Defense State And Local Gove...
Join Attivo Networks and Carahsoft to discuss how state and local governments continue to be a top target of ransomware attacks which cause major disruption as well as operational and financial impacts throughout the USA. Active Directory (AD) remains the first target for attackers, often abusing misconfigurations that the SecOps team is unaware of due to the lack of visibility. By evading traditional defense mechanisms, attackers advance thei...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
Back to Search Begin New Search