Back to Search Begin New Search Save Search Auto-Notify
Unifying Cyber Defense Teams with Share...
The ThreatQ platform is designed to improve security operations workflows by delivering immediate and significant value across multiple use cases to include data management, prioritization, integrations, collaboration, and curated threat data sharing. ThreatQ provides the ability to securely share curated threat data between organizations automatically. Whether to block an IP, detonate a malicious file, or alert an organization to a possible n...
Add Favorite
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. Join Zscaler on Jul...
Add Favorite
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
Add Favorite
Create Custom Virtual Learning Experiences
Moving training online can prove challenging, requiring organizations and instructors to create a virtual environment that is as effective and engaging as in-person training. With Adobe Connect, users are empowered to deliver virtual training sessions that rival any in-person learning experiences. Join our complimentary webinar to learn how to deliver immersive, live virtual classroom experiences that expand in-person training in a more conven...
Add Favorite
Detect Cellular, Bluetooth, BLE, Wi-Fi...
Carahsoft and Bastille invite you to join us as we learn how to use a device detection and location kit to find unauthorized devices. The Concern:Are wireless and cellular devices coming into, and possibly passing through, the Visiting Room into other areas a concern for your facility? Bastille's Solution: Bastille detects and locates Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. This provides security teams the ability to accurately locat...
Add Favorite
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Powerful Water Modeling on Virtually An...
Water system design and analysis can be costly, time consuming, and challenging for municipal agencies. The combination of CAD, GIS, simulation and analysis features needed to produce a useful model usually means bouncing between different technologies and platforms. Often, it's a marginal CAD-enabled platform that requires export to a GIS platform, or a limited bolt-on tool that is tied to a GIS platform, neither supporting the iterative need...
Add Favorite
Improving Your DevSecOps Experience wit...
Bringing real-time decision-making capabilities to the warfighter requires a transformation within the U.S. Department of Defense (DoD) to meet the evolving skill demands of today's digital landscape.Join U.S. Marine Corps colleagues for a demonstration of introductory topics focused on enabling greater DevOps experience by leveraging Red Hat Openshift Container Platform (OCP), including:Understanding DevSecOps and microservices architecture b...
Add Favorite
Upskilling and Reskilling Healthcare Workers
Continuous education in healthcare is key. Rapid advances and changes mean practitioners need to keep pace with training and new information in order to best serve patients. With the help of eLearning, healthcare professionals can learn and complete trainings virtually on their time, and not take time spent in a classroom away from their patients. Join our complimentary webinar to learn how to quickly and effectively reskill and upskill your e...
Add Favorite
Back to Search Begin New Search