526 webcasts found
+ 1401 past events found
Back to Search Begin New Search Save Search Auto-Notify
Fight Cybercrime with X-Ray Vision
Trustwave Government Solutions Managed Security Services (MSS) is the combination of the industry’s best preventive and detective tools under a world-class managed services umbrella with unrivaled global threat intelligence. Just because you bought a car, doesn’t mean you know how to drive. Purchasing one of the top 10 technical tools requires expert installation, tuning, and ongoing support. Making sense of minor issues to major e...
Add Favorite
Discover the Benefits of VMware Cloud
Join VMware and Carahsoft for a partner webcast to hear field sales subject matter experts discuss the benefits of implementing VMware’s Cloud, and how you can leverage this valuable asset to grow your business and improve pipeline. In this webcast our speakers will cover: The key components and benefits of VMware Cloud Disaster Recovery (VCDR). An overview of VMware Cloud (VMC) on Dell EMC, use cases, and multi-cloud integration. Resour...
Add Favorite
NASA Webcast Series: Data Security for All
VMware, August Schell and Carahsoft would like to offer you the opportunity to view these on-demand sessions on various topics that your organization may be interested in. View these on- demand sessions: NASA IT Strategic Goal: PeopleAnywhere Workspace: Revitalize Your Agency's Remote Work Strategy NASA IT Strategic Goal: Cyber SecurityCarbon Black: Deploy Advanced Threat Intelligence to Protect What Matters NASA IT Strategic Goal: Cyber Secur...
Add Favorite
Avoiding Data Lockdown - Protecting Dat...
According to Ponemon, 88% of public sector organizations have experienced at least one cyberattack in the past two years due to public sector organizations offering an abundance of sensitive data for hackers. How can you prepare for these attacks? Join Otava and Carahsoft to discover the best methods used to prepare for cyberattacks. With the rise of hacking, ransomware, and cybercrime, Otava provides data protection services to ensure the sec...
Add Favorite
Log4Shell Exploit Explained
Join us as RangeForce's Director of Sales Engineering, Tanner Howell, walks us through a hands-on training module around the Log4Shell exploit. You will learn how the exploit works, see how it is applied to a vulnerable service, and see how to detect and mitigate the vulnerability. RangeForce is a hands-on cybersecurity upskilling platform covering nearly every cybersecurity topic from incident response, to secure programming, to advanced pene...
Add Favorite
The U.S. Securities and Exchange Commis...
The U.S. Securities & Exchange Commission recently proposed rules to strengthen the ability of public companies, funds, and advisors to combat cybersecurity threats and implement risk mitigation processes. SecurityScorecard was joined by Kristy Littman, U.S. Securities and Exchange Commission Chief of the Crypto Assets and Cyber Unit, Michael Daniel, President & CEO of the Cyber Threat Alliance and Friso van der Oord, Senior Vice Presi...
Add Favorite
Attack Surface Management from Palo Alt...
The attack surface of universities and school districts ballooned in recent years with the explosion of remote learning. It's never been more critical to have an up to date inventory of all assets - including IP addresses, domains, certificates, cloud infrastructure and physical systems - connected to your organization. You can't predict with certainty how you will be attacked in the future, but you can learn from recent attacks - and from the...
Add Favorite
Moving to an Endpoint-Centric Zero Trus...
Join SentinelOne on May 26th, to learn the Guiding Principles of ZERO Trust: Never trust, always verify-Treat every user, endpoint, application or workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required Assume breach-Operate and defend resources with the assumption that an adversary already has a presence within the environment. Deny by default and scrutinize all users, endpoints, data f...
Add Favorite
Cybersecurity Maturity Model Certificat...
VMware and Carahsoft would like to offer you the opportunity to view these on-demands on various topics that your organization may be interested in: Session One: Cybersecurity Maturity Model Certification (CMMC) Updates for the Department of Defense's (DoD) strategic direction on the CMMC program included in version 2.0 Clarifications on the different phases of inclusion for bidders, contractors, and service providers How the Executive Order f...
Add Favorite
Bridging the Gaps of Cybersecurity
With 70% of government breaches caused by phishing, and the public sector being the second most victimized industry, the importance of aligning cybersecurity priorities is even more critical to winning the war against phishing. View this on-demand webinar to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions and learn expert insights on how you can protect your agency by combining the po...
Add Favorite
Back to Search Begin New Search