Back to Search Begin New Search Save Search Auto-Notify
The Attackers Perspective Through Splun...
Join us for a presentation where we will explore the recently published NodeZero App for Splunk, allowing direct Splunk ingestion of its penetration test results.As the industry accelerates toward a threat landscape of attack and defense by algorithm and machine, humans must run at machine speed to manage the stakes of tool misconfiguration, mishandling of logs, and missed patching opportunities. The NodeZero app for Splunk is a force multipli...
August 17, 2022
Organizer: Horizon3.ai Government Team at Carahsoft
Location: Webcast
Add Favorite
GovForward ICAM Workshop
Identity takes center stage as zero trust implementations grow. Identity has been key to individual access to information for some time in government, but it has often been based on physical access cards. As the federal government now begins a move to accommodate more mobile devices in non-traditional environments, agencies are working to consolidate and update their identity systems to protect a broad range of access by individuals and device...
August 17, 2022
Organizer: FCW | Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Meeting Federal Zero Trust Standards wi...
In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. To meet this changing security landscape, federal agencies and the defense industrial base mus...
August 17, 2022
Organizer: AvePoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Workflow Warfare - Bringing AI to DoD's...
The Department of Defense can only transform itself as fast as its slowest workflow. At the foundation of DoD’s various warfare capabilities – including cyber, electronic, and information – is the push to transform its administrative advantage in “Workflow Warfare.” These elements of warfare are the backend processes that make a large agency run effectively and connect IT, HR, finance, procurement, workplace, and...
August 17, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Creative Procurement for Innovation
This panel will focus on bringing together federal professionals to share acquisition best practices. As many are learning in the government digital space, while modern practices and technical capabilities are the outcome, the process of modernizing starts with acquiring the services in new ways. This panel will allow acquisition specialists and leaders to share what they’re doing to transform their digital services, and the agile procur...
August 17, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
Vulnerability and Patch Management: Eve...
ProxyLogon. Log4Shell. Print Nightmare – 2021 was the worst year ever for major vulnerabilities and exploits, and there’s no reason to believe the pace is slowing down. Rushed code development, third-party libraries, and a growing array of API bugs are overwhelming companies’ efforts to manage and patch vulnerabilities in their systems and devices. With that in mind, this eSummit will explore how companies can adjust their st...
August 16-17, 2022
Organizer: SC Media
Location: Virtual
Add Favorite
Detroit Cyber Security Summit
The Second Annual Detroit Cyber Security Summit returns on August 16th, In-Person at the Marriott Renaissance Center and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussi...
August 16, 2022
Organizer: Official Cyber Security Summit
Location: Detroit, MI
Add Favorite
Determining the Requirements for Delive...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
August 16, 2022
Organizer: Public Contracting Institute
Location: Webcast
Add Favorite
Strengthen Your Peoplesoft Identity and...
Join Pathlock and Carahsoft for a webinar to learn how to strengthen your PeopleSoft identity and access governance strategies with automation. Organizations are managing a daunting task to safeguard access to PeopleSoft with a constant flow of requests for user on-boarding, off-boarding, and users changing roles. Properly provisioning user access can be manual, time-consuming, and resource-draining.To ensure productivity, it is critical to ha...
August 16, 2022
Organizer: Pathlock Government Team at Carahsoft
Location: Webcast
Add Favorite
Detect Financial Fraud with Data Scienc...
Amid the rise of financial fraud in the post-pandemic world, organizations need secure, scalable, and robust methods to mitigate risks. Using SAIC's Tenjin Artificial Intelligence (AI) Platform, the highly secure Koverse Data Platform, and Tableau, stakeholders can quickly and easily gain more accurate and informative insights from complex and disparate data sources. This use case will identify predictors of fraudulent transactions, which can...
August 16, 2022
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search