Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
AI, Machine Learning and Strengthening...
The federal government is dedicated to advancing U.S. leadership in the research, development and use of artificial intelligence (AI), to promote both national security and economic prosperity. Using AI to improve cybersecurity is a logical target for its implementation. It is especially important as the threat landscape continues to evolve. The World Economic Forum (WEF) reports that about 1.7 billion IoT devices have been installed to date i...
Ending Phishing Season: How State and L...
Phishing attacks are rising dramatically, particularly those aimed at state and local governments, with recent reports suggesting incidents have nearly doubled. Attacks have targeted a wide swath of the workforce—from revenue and tax officials to employees in elections and unemployment offices.The increased number of phishing incidents have moved beyond email to also target victims through social media, texts and other channels. Regardle...
CyberSmart TV: Opening the Door for Mod...
As part of the American Rescue Plan passed earlier last year, the Technology Modernization Fund received a major influx of funding to support cybersecurity efforts, most of which targeted zero trust architecture. How are leaders implementing zero trust as part of their larger cybersecurity strategy? Beyond the technical efforts, what kind of culture is necessary to support zero trust frameworks? This episode explores the impact that additional...
Adversary Emulation at Scale with Rebel...
Rebellion Defense and Carahsoft invited you to learn how your agency can deploy automated adversary emulation with Nova and uncover the security weaknesses that have the greatest real-world consequence for your mission. Experts discussed how you can: Leverage advanced automation to emulate adversary tactics, techniques, and procedures (TTPs) at scale. Gain a contextualized understanding of how cyber defenses truly stand against real-world atta...
How to Prepare for CMMC Mandate
RegScale and Carahsoft hosted this webinar to help you and your cybersecurity team prepare for DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. Under the CMMC program, all Defense Industrial Base (DIB) contractors will be required to implement certain cybersecurity protection standards and perform self-assessments or obtain third-party certification as a condition of DoD contract award to better protect controlle...
Ensure Cyber Threat Defense with Zero T...
You think you have your Zero Trust framework dialed in, but the unimaginable happens. Bad actors have penetrated your agency’s perimeter, network, and endpoint security solutions, leaving you with your last layer of defense - the data layer itself. Join Rubrik and Carahsoft for an on-demand webinar to fortify your defenses against cyber threats. Built to withstand pervasive cyber threats, Rubrik's Zero Trust data security ensures resilie...
Security Programs that Thrive in Econom...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this pr...
Mission First: Public Sector Podcast Series
Listen to Mission First, VMware and Carahsoft's Public Sector podcast series focusing on the mission, not the products. Hear season two, episode one of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Attendees heard from Mike Dent, Chief Information Cyber Security and Privacy Officer for Fairfax County Government and Craig Bowman, Senior Director - Federal at VMware, d...
Oracle Cybersecurity Webinar Series
What does cybersecurity encompass? This can range from various pieces that comprise the overarching thought of cybersecurity. Oracle's portfolio of solutions provide assistance to federal customers with efficiency and security. Ransomware is one of the highest risks for any data-driven organization. Besides reducing the chances of an attack, agencies also need to evaluate data compromise and extraction, as well as post-attack recovery. This se...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.