Back to Search Begin New Search Save Search Auto-Notify
Ransomware Readiness: What Preparation...
When considering today's evolving threat landscape, it's imperative that organizations have a Cybersecurity Incident Response Plan (CSIRP) and are well educated on ransomware readiness. Both can be achieved with the help of Optiv. Optiv's approach includes a deep evaluation of your organization's current people and processes while simulating adversary tactics, techniques, and procedures (TTPs) in your environment. Optiv's expertise and guidanc...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Three Keys to Fulfill New Cybersecurity...
Join AWS, Wickr, Presidio Federal and Carahsoft to explore how together we can help your agency meet fulfill these requirements with ease – from creating a plan to accelerate cloud adoption, building architectures with a zero-trust security model, and increasing your overall environments visibility for security and compliance purposes. You will walk away with invaluable knowledge on how to: Adopt easy to use, secure multi-factor authoriz...
Add Favorite
FCW Workshop: Public Safety
From wildfires and hurricanes to increasing crime rates and the continuing pandemic, public safety organizations at all levels of government find themselves spread thin these days. However, a continued wave of technology innovations can help fill their need for better data, quicker response and effective delivery of services. The move of many public safety organizations to the cloud has opened new options for using and sharing operational data...
Add Favorite
Strategic Use of Federal Funds Availabl...
Join Fortinet and Carahsoft for an in-depth review of the current state of federal funding for K-12. Educational institutions are often the target of cyberattacks, but have limited resources to deploy in defending against them. The pressure on IT and security experts in educational institutions to do more with less is constantly increasing as well. During this webinar, participants will learn about: Federal funding that is currently available...
Add Favorite
CXO Cheat Sheet: Complying with the Fed...
With the release of OMB's Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. The strategy further codifies the importance of moving off of legacy security infrastructure to embrace a Zero Trust architecture. But as agencies rush to develop Zero Trust implementation plans, they must carefully consider key aspects of their deployment or risk co...
Add Favorite
Get More Out of Your Gigamon
The goals and milestones prescribed in OPM Memorandum M-21-31 seem almost impossible to achieve, which include improving the capabilities related to cybersecurity incidents. Join Gigamon and Carahsoft to learn how Deep Observability can help you fast-track your compliance with the Memorandum's objectives all-the-while achieving a foundation for a scalable Zero Trust Architecture. In this complimentary webinar, we will discuss: What M-21-31 is...
Add Favorite
"But We've Always Done it This Way...
Join Carahsoft and Blackberry for this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry to explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity - or having a bigger team - does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results
Add Favorite
How to Simplify and Secure IT Operation...
During this webinar, attendees will learn the practical benefits of letting digital assistants take on tedious tasks like account creations, setting up and helping remote workers, data cleansing and performing day-to-day system maintenance.
Add Favorite
Cohesion out of Chaos: Understanding th...
In late January, a National Security Memorandum was signed to improve the cybersecurity of National Security as required by the Executive Order, 14028. This highlighted the need to increase the sharing of information regarding threats, incidents, and risks across agencies to enable a more effective defense. This memorandum requires the need to develop a framework to coordinate and collaborate on cybersecurity and incident response activities....
Add Favorite
Back to Search Begin New Search