Back to Search Begin New Search Save Search Auto-Notify
Empower YOUR Business - How recent brea...
Danyetta Fleming Magana, CEO of Covenant Security Solutions and Janice D. Pryor, Director of CyberSecurity Training for Covenant discuss the latest trends in CyberSecurity including lessons learned and future impact of the OPM and Ashley Madison Breaches among others. Learn how these high profile breaches are affecting regulators and lawmakers and ultimately your business. Tune in to learn what you can do today to prepare your CyberSecurity po...
September 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
TechLeader.TV with California State Aud...
TechLeader.TV Host John Thomas Flynn, former CIO for California and Massachusetts, and President of NASCIO, will interview State Auditor Elaine Howle. Topics will include the various audit reports critical of the State of California's management of its $5 bilion annual IT investment.
September 15, 2015
Organizer: TechLeader.TV
Location: Webcast
Add Favorite
Joint Critical Infrastruture Partnershi...
This webinar series, coordinated by the DHS Office of Infrastructure Protection, is co-sponsored by InfraGard, private-industry-focused Regional Consortium Coordinating Council (RC3), and the State/Local, Tribal, Territorial Government Coordinating Council (SLTTGCC). Each hour-long Webinar session is designed to assist critical infrastructure owners and operators, physical security and information security professionals, Chief Information Off...
September 9, 2015
Organizer: U.S. Department of Homeland Security
Location: Webcast
Add Favorite
The Ins and Outs of Risk-Based Authenti...
Traditional ways of securing access to applications have failed. In light of the recent news around identity theft and data breaches, it is obvious that a username and password are not enough. Join TransUnion and Ping Identity for a 30-minute webcast to hear how to put the identities of your internal and external end users at the center of securing access to your applications. Attendees of this webcast will learn about: Proven identity-managem...
September 1, 2015
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Detect Advanced Threats with Behavioral...
Behavioral analytics is a new approach to threat detection that uses advanced machine learning and probabilistic math to identify the anomalous actions unique to both outsider and insider attempts to steal sensitive data. Early deployments in the field show this method to be highly effective.View our on-demand webcast to hear data scientist Stephan Jou, CTO of Interset, discuss how behavioral analytics is a game changer when it comes to detect...
August 20, 2015
Organizer: Interset Government Team at Carahsoft
Location: Webcast
Add Favorite
VMware vCloud Government Service: Benef...
VMware vCloud Government Service hosted by Carpathia is an enterprise-class hybrid service that delivers the tested and proven VMware technology used widely by every executive and cabinet level federal agency today, with the added security and compliance assurance of FedRAMP authorization. VMware vCloud Government Service gives customers the ability to run applications securely with data mobility, and enables federal agencies to utilize both n...
August 11, 2015
Organizer: VMware Government at Carahsoft
Location: Webcast
Add Favorite
Manage Supply Chain Risk and Safeguard...
As sensitive information continues to increase in volume, so do potential threats to information security. This data can be found essentially anywhere, including laptops, smartphones, tablets, removable media, and cloud storage. Organizations must consider security at every step in the content lifecycle to help ensure that all information remains safe, and to achieve compliance with federal regulations. Join us on Tuesday, August 11th to learn...
August 11, 2015
Organizer: Adobe Government at Carahsoft
Location: Webcast
Add Favorite
Simplify and Streamline Data Transfer b...
Big Data is a collection of data sets so large and complex that it becomes difficult to process using existing database management tools or traditional data processing applications. This influx of data sets also brings the challenges of capture, curation, storage, analysis, and visualization along with it. As organizations work with an increasing number of agencies, the size of the data being exchanged increases in terabytes or exabytes. Toget...
August 5, 2015
Organizer: Globalscape Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Combat Unsafe Activities Occurring in S...
Most school systems already have personnel and systemic remedies in place to overcome bullying/cyberbullying, drugs, fights, sexual improprieties, and other unsafe activities that infect their schools. However, programs, like anti-bullying campaigns, lack the ability to gain the knowledge needed to combat these events prior to occurrence, and even to record and recover information afterwards. View our complimentary on-demand webinar to learn h...
August 5, 2015
Organizer: Text2Them Government Team at Carahsoft
Location: Webcast
Add Favorite
IBM Secure Data Exchange Webinar
Protect Against Data Breaches with IBM Sterling Secure ProxyMore Than Just Your General Proxy The need to protect your agency from security breaches is at an all-time high, and the average cost of a single breach in the US is roughly $6.53 million. With this increasing risk, we are being forced to implement stricter government security requirements. We invite you to join us for a complimentary webinar where Jatinder Grewal, IBM North American...
August 4, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search