Back to Search Begin New Search Save Search Auto-Notify
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Add Favorite
Improving Your DevSecOps Experience wit...
Bringing real-time decision-making capabilities to the warfighter requires a transformation within the U.S. Department of Defense (DoD) to meet the evolving skill demands of today's digital landscape.Join U.S. Marine Corps colleagues for a demonstration of introductory topics focused on enabling greater DevOps experience by leveraging Red Hat Openshift Container Platform (OCP), including:Understanding DevSecOps and microservices architecture b...
Add Favorite
Additive Manufacturing: The Next Genera...
The U.S. military maintains bases in more than 70 countries and territories around the world, some of them in inhospitable or hard-to-reach areas. When a piece of equipment fails – whether a weapon, a radar dish, or something more prosaic like a mess hall stove – getting replacement parts can be difficult and time-consuming, and the delay can cause anything from mild inconvenience to serious problems meeting the mission. Larger bas...
Add Favorite
Industry Perspectives on CMMC 2.0
With recent discussions about changes to the Cybersecurity Maturity Model Certification (CMMC), Defense Industrial Base organizations can be sure that the intent and desired outcome of the program remains. Join this webinar to hear from experts at Carahsoft, Baker Tilly, and Pillsbury on the evolving CMMC program and what this means for the Defense Industrial Base. Topics include: What are the proposed changes with CMMC 2.0? Why should organiz...
Add Favorite
Digitizing the POM for Faster Decision Cycles
DoD Leadership struggles to manage and allocate funds for various defense programs across each of its branches of the Armed Forces. There are guidelines to meet, as well as mission analysis, objectives, alternative courses of action and numerous, time-consuming data calls. The Program Objective Memorandum (POM) process requires managing voluminous datasets and reporting, as well as the challenge for perspective on what is currently funded and...
Add Favorite
Mission First: DoD and National Securit...
Join VMware and Carahsoft for the live viewing of episode two of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. During this session, Jeremiah Sanders, Co-Founder of Kessel Run and Senior Federal Strategist, VMware and Alex Barbato, Senior Engineer, VMware Tanzu will discuss: Continuous ATO and how has it evolved into Continuous Risk Management Framework The evolution o...
Add Favorite
Achieving Mission Outcomes with Elastic...
The Elastic Search Platform is used across all levels of Department of Defense (DoD) networks and throughout the Army. This includes air-gapped environments for searching and analyzing structured and unstructured data in real-time from disparate sources and geographical locations. Elastic offers a flexible, single pan of glass platform that supports multiple use cases, including network monitoring, SIEM and security, aggregation and real time...
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
Configuring Jira for Maximum Agility Webinar
Defense agencies rely heavily on being able to send and receive information in real-time to ensure mission-critical projects succeed. Atlassian's suite of agile tools allows teams to transform the way they create and deliver software. Join us on March 29th at 3:00pm (ET) as Ariel Partners' Chief Technology Officer, Craeg Strong, discusses their latest training initiatives with DoD personnel and how to best leverage agile practices with Atlassi...
Add Favorite
FASTTR on AWS: Reduce the Time and Cost...
In this informative webinar you will learn about Continuous ATOs (cATO), using OSCAL for creating digital SSPs and implementing strong Continuous Monitoring controls, as well as: Dedicated government landing zone compliant with FedRAMP and DOD/DISA requirements Pre-audited NIST compliant security services for FedRAMP Moderate, High, JAB, DOD IL-5 and U-NNPI compliance ATO ready package using OSCAL
Add Favorite
Back to Search Begin New Search