3,111 webcasts found
+ 7 past events found
Back to Search Begin New Search Save Search Auto-Notify
CTO Sessions: Best Practices for Data i...
High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. So, what is the best way to protect network traffic? Encrypt ev...
Add Favorite
2024: FAR Part 52, Solicitation Provisi...
Join Washington DC based, Jennifer Schaus & Associates in the 2024 Webinar Series covering The FAR, Federal Acquisition Regulations. This series features guest speakers who will uncover the important details and nuances of The FAR. Get educated about the rules and regulations in the game of federal contracting. This series is COMPLIMENTARY & RECORDED. Recordings are posted on our YouTube Channel. CORPORATE SPONSORSHIPS of this Webinar...
Add Favorite
Transform Public Sector Pay with Earned...
Curious about transforming public sector pay? Attend the next DailyPay event or webinar hosted by Carahsoft.Attendees learned about:The benefits of changing how you pay your employees.Boosting recruitment and retention by adding new benefits like earned wage access (EWA).Implementing EWA without changing your payroll systems.Empowering employees with control and peace of mind.
Add Favorite
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we focused on these new security threats and provided you with real-world examples of some...
Add Favorite
5G for the Tactical Edge
Participants in this webinar discovered how the US Department of Defense collaborated with technology providers to enhance 5G capabilities for mission-critical applications in tactical edge networks.
Add Favorite
Ensure Resiliency Against Cyber Threats
Attendees of this webinar learned:Preparing for Ransomware Attacks and Rapid RecoveryCrafting Effective Grant ProposalsThe Advantages of Working with Assured team of experts
Add Favorite
Using Data and Visualizations to Bring...
The United States spends almost $800 billion annually on K-12 education with almost half of that or $376 billion coming directly from state appropriations. This complexity arises from the multiple funding sources with differing regulations, the need to ensure equity and adequacy, the use of multiple data sources including student demographic factors and differing needs, and the historical and political factors included in K-12 funding. Watch t...
Add Favorite
Red Hat Tech Day
Red Hat and Emergent hosted a Federal Tech Day at the Carahsoft office in Reston, VA on Wednesday, July 31, 2024. Experts from Red Hat and Emergent held an engaging, hands-on workshop on OpenShift Virtualization. The event also featured a fireside chat with leaders from Veeam and GitLab. Attendees learned more about:Why OpenShift Virtualization is more than an alternative How OpenShift streamlines development and gains operational efficiencies...
Add Favorite
Harnessing the Power of Public Web Data...
This was an insightful webinar where we introduced the Socialgist data platform and demonstrated how we gather publicly available web data at scale to enhance Open Source Intelligence (OSINT) analytics projects. During this webinar, attendees were able to:Learn about the capabilities of Socialgist in indexing and filtering public web dataDiscover practical applications of public web data in OSINT analytics to gain actionable insightsExplore an...
Add Favorite
Fortifying The Expanding Role Of The Fe...
In the last five years, OMB and CISA have been expanding the role of Federal cybersecurity programs beyond traditional IT. As the threat has expanded deep into software supply chain, third-parties, IOT/OT and cryptography, understanding where to focus has become more difficult and resource intensive. The CISO and their staff constantly balance mission priorities with zero trust goals, audit findings and modernization efforts while continually...
Add Favorite
Back to Search Begin New Search