Back to Search Begin New Search Save Search Auto-Notify
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
June 6, 2024
Organizer: ThreatLocker Government Team at Carahsoft
Location: Webcast
Add Favorite
Minecraft Education Hackathon Celebrati...
We are delighted to invite you to the celebration ceremony of the Minecraft Education Hackathon Tournament. This special event is dedicated to celebrating the innovative efforts and achievements of educators and students from around the world. The Hackathon has been a testament to the power of collaboration and creativity across borders. As we gather to honor the exceptional projects and the brilliant young minds behind them, your presence as...
June 6, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Microsoft Azure Data & AI Solutions
Microsoft Azure Data & AI Solutions webinar is an engaging online session where our expert speakers will delve into: Microsoft Fabric: Discover how Microsoft Fabric revolutionizes the landscape of end-to-end Analytics, offering seamless integration and powerful insights. Azure OpenAI: Explore the integration of Azure OpenAI within the Microsoft ecosystem and uncover its potential to drive innovation and enhance AI capabilities. Industry-Sp...
June 6, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Powering a Future-ready Government with...
Government agencies are updating their network infrastructure to meet the increasing demand for digital services and accommodate a distributed workforce, but these enhancements come with new challenges–like network complexity, lifecycle costs, and security. Unlike bolt-on solutions, Juniper Networks’ AI-Native Networking Platform is a game-changing solution conceived and developed with AI integration at its core to address these ch...
June 6, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
June 6, 2024
Organizer: UberEther Government Team at Carahsoft
Location: Webcast
Add Favorite
CIOs Need CxO Engagement Mojo To Democr...
CEOs and boards of directors want more technology delivery to happen directly in business areas. To enable this shift, CIOs must boost their engagement with other CxOs and revisit the mission and structure of their IT organizations. Join this complimentary webinar as a panel of Gartner experts explore why CIOs must increase CxO engagement to change the way technology projects are funded and find new ways to communicate the business value of IT...
June 6, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. Reserve a spot and earn up to 3 Continuing Professional Education (CPE) credits by taking th...
June 6, 2024
Organizer: Armis Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Gemini for Google Workspace: Developing...
Gemini for Google Workspace is a powerful collaborative partner that can act as an effective prompt, thought partner, source of accuracy and productivity booster—all while ensuring every user and organization has control over their data. In this session, you will learn about: Leveraging generative AI for enhanced efficiency Prioritizing public sector use cases for maximum impact Practical examples and best practices tailored to governmen...
June 6, 2024
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search