Back to Search Begin New Search Save Search Auto-Notify
Roadmap to Modernization: Funding the Future
As offices across the federal government continue to adopt new technologies and modernize their systems, it’s essential that when doing so, they consider how best to budget and finance their increasingly complex projects. From capital funds to congressional approval, the means and methods by which organizations procure and profit from these advancements are as plentiful as they are complex.In this next installment of our IT Modernization...
Add Favorite
Build a Scalable and Secure CI/CD Pipel...
Join our experts to learn how teams inside Department of Homeland Security (and DHS components) can deploy Splunk, GitLab, and D2iQ together to support CI and CD process automation, securely accelerate application development and deployment, and lay the groundwork for continued modernization and innovation.During this webinar, attendees will learn:How to secure each stage of the development lifecycle through GitLab (SAST, DAST, Container Scann...
Add Favorite
Preventing Ransomware Attacks with Acti...
Ransomware attacks against state and local governments are on the rise. On June 2nd, the White House urged organizations to take the necessary steps to protect themselves against ransomware. Exploiting Active Directory (AD) and attacking unpatched vulnerabilities are frequent tactics for attackers. Join Tenable and Carahsoft as we discuss how ransomware takes advantage of weaknesses in your Active Directory domains and explore ways your agency...
Add Favorite
Unifying Cyber Defense Teams with Share...
The ThreatQ platform is designed to improve security operations workflows by delivering immediate and significant value across multiple use cases to include data management, prioritization, integrations, collaboration, and curated threat data sharing. ThreatQ provides the ability to securely share curated threat data between organizations automatically. Whether to block an IP, detonate a malicious file, or alert an organization to a possible n...
Add Favorite
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. Join Zscaler on Jul...
Add Favorite
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
Add Favorite
Create Custom Virtual Learning Experiences
Moving training online can prove challenging, requiring organizations and instructors to create a virtual environment that is as effective and engaging as in-person training. With Adobe Connect, users are empowered to deliver virtual training sessions that rival any in-person learning experiences. Join our complimentary webinar to learn how to deliver immersive, live virtual classroom experiences that expand in-person training in a more conven...
Add Favorite
Detect Cellular, Bluetooth, BLE, Wi-Fi...
Carahsoft and Bastille invite you to join us as we learn how to use a device detection and location kit to find unauthorized devices. The Concern:Are wireless and cellular devices coming into, and possibly passing through, the Visiting Room into other areas a concern for your facility? Bastille's Solution: Bastille detects and locates Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. This provides security teams the ability to accurately locat...
Add Favorite
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Back to Search Begin New Search