Back to Search Begin New Search Save Search Auto-Notify
Investigations on the Darknet: Case Stu...
The darknet is a network, built on top of the internet that is purposefully hidden, meaning it has been designed specifically for anonymity. Unlike the deep web, the darknet is only accessible with special tools and software - browsers and other protocol beyond direct links or credentials. You cannot access the darknet by simply typing a dark web address into your web browser. Join us for this webinar to explore various case studies that invol...
September 10, 2019
Organizer: DarkOwl Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Cybersecurity M&A Diligence and Integra...
Know the Unknown with Expanse!Evaluating the cyber risk in an M&A transaction is an ongoing challenge for federal contractors. New laws continue to add financial risk to the Prime. Expanse can give you visibility into specific risks on the global Internet for networks you don't control. Don't be left in the dark with only risk scores and no detail. Join Expanse to learn how leading commercial and system integrator organizations use their s...
September 5, 2019
Organizer: Expanse Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Cloud Working Group Launch
Register today for ATARC's September 4th Cloud & Infrastructure Working Group Launch at USDA (1400 Independence Ave SW #5071) in Washington, D.C.! The half-day event will kick start the activities for the Cloud & Infrastructure Working Group. In addition, the event will focus on the Data Center Optimization Initiative (DCOI) and its alignment with Cloud Smart and Application Rationalization. Gary Washington, CIO of USDA, will kick off...
September 4, 2019
Organizer: ATARC
Location: Washington, DC
Add Favorite
Breakfast & Learn
As cyber threats to U.S. national and economic security are increasing in frequency, scale, and sophistication, departments must be prepared to defend the homeland and support civil authorities in all domains – including cyberspace - to support a national effort to confront cyber threat to critical infrastructure. The right combination of technology, intelligence and people is key to the team’s ability to monitor, detect, and preve...
August 29, 2019
Organizer: DLT Solutions
Location: Herndon, VA
Add Favorite
Planning Electronic Security Systems fo...
This course was developed with the asset owner in mind. Students will learn how to design CCTV systems for different types of secure areas, compounds and installations. Students will be able to design their own intrusion detection (IDS) and access control systems (ACS) for sensitive compartmented Information facilities (SCIF) and secure vaults, limited access or controlled areas, and high value storage areas. Students will ultimately combine c...
August 27-29, 2019
Organizer: Haines Security Solutions
Location: McChord Air Force Base, WA
Add Favorite
Combating Excessive Fuel Spend withData...
With next-level telematics technology, government fleets now have more insight than ever to understand where processes break down and to take control over fuel expenses. Join our complimentary webinar that will showcase how to: Identify and change excessive fuel spending behaviors Monitor and compare fuel consumption and purchases across vehicles and drivers Identify strategic savings opportunities Maximize fuel MPG with comprehensive planning...
August 28, 2019
Organizer: Vehicle Tracking Solutions Gov Team at Carahsoft
Location: Webcast
Add Favorite
Live Webinar: Protect Your Agency's Cel...
Join BlackBerry for a live webinar that focuses on the risks and how to better secure your organization with BlackBerry's SecuSUITE, a National Information Assurance Partnership (NIAP) and Commercial Solutions for Classified (CSfC) certified platform. During this on demand webcast attendees will learn: The scope of the current risk to cellular communications Why consumer grade messaging systems are not suitable solutions Types of communicatio...
August 27, 2019
Organizer: BlackBerry Government Team at Carahsoft
Location: Webcast
Add Favorite
Securing NPE in Cloud and Hybrid Enviro...
In a digitally transforming world, reliance on cloud migration strategies has embedded itself in the foundation of securing and optimizing our nation's defense and intelligence systems. Additionally, the maturity and security of cloud migration programs and cloud dependencies across the DoD are being heavily deliberated. This makes getting ahead of the identity management crisis more imperative than ever.In this webcast, hear from industry exp...
August 27, 2019
Organizer: Venafi Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Robotic Process Automation (RPA), Intel...
Robotic Process Automation (RPA) has the potential to automate entire processes or part of processes that are repetitive, monotonous and occur in high volumes. In a shrinking budget environment, RPA is a tool to “do more with less”. While RPA automates “hand work”, AI assisted Intelligent Automation also automated “head work”. RPA, IA and AI has spread rapidly in the private sector and many federal and state...
August 22, 2019
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
McAfee Identity Management Webinar
The move to the Cloud brings about new security risks that require cloud-driven solutions. In this complimentary webinar hosted by McAfee and Carahsoft Michael Giordano, Principal Security Architect at DynTek, will identify exactly how to access these innovative solutions.During this webinar, we will discuss governance and policy as it relates to providing robust information security risk mitigation and best practices including McAfee MVISION Cloud.
August 22, 2019
Organizer: McAfee Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Back to Search Begin New Search