Splunk & Carahsoft Virtual Workshop Wed...
Curious how Splunk can further help your organization?Join us for our informative, hands-on virtual workshops where your IT teams will have the opportunity to increase the level of Splunk skillsets across your organization.Date & TimeSessionWednesday, April 8th1:00pm ET; 10:00am PT1.5 hoursGeneral Splunk Configuration: An introduction to Splunk's CLI illustrating initial configuration and customization of Splunk including setting custom po...
Importing 201 Live Webinar
Live, Online & Interactive Training Webinar Information: Advanced Import Compliance. As an experienced importer your company has a grasp on the basic procedures to manage the importation of your goods into the U.S. It seems, however, that is all you do, manage the process. Despite your best efforts, the process doesn’t appear to get any better. You experience the same old errors and delays at the border and the specter of a Customs a...
GSA ALLIANT 2
The next generation GWAC vehicle, Alliant 2, offers comprehensive information technology (IT) solutions through customizable hardware, software, and services solutions purchased as a total package. The new course builds off of the success of Alliant, and creates a contract vehicle that provides a total solution to agencies' requirements while maximizing opportunities. In this course, you will learn about the Alliant 2 GWAC Program offered thro...
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Importing Procedures Live Webinar
Live, Online & Interactive Training Webinar Information: Too often importers expect their brokers to do all of the work when it comes to the importing process. Unfortunately the broker is NOT a tax advisor. Any errors they make could result in penalties for you, the importer. Learn the key compliance elements of importing, classification, valuation, country of origin duty payment and record keeping. Learn also how to decipher those cryptic...
How to Maintain CIS Controls in a Remot...
In light of recent events, most of the country is now turning to a remote setup very rapidly. As a result, new devices are now establishing remote connections since many employees are connecting their personal computers to the corporate network, making the attack surface bigger than ever before.Compliance, proper network segmentation, and accurate device network access control are extremely challenging for any IT team right now and the attacke...
FPDS: A Guide to Competitive Intelligence
Are you using the Federal Procurement Data System (FPDS) information in your business, marketing, and proposal development? It is a free real-time database serving the government acquisition community and is recognized as the authoritative source of contract information that is updated daily. The Federal Acquisition Regulation (FAR) establishes FPDS as the official reporting tool and repository for Federal procurement transactions. Our FPDS: A...
2020 OptivCon Dallas
CANCELED
To protect the health and safety of attendees, this event has been canceled due to COVID-19 concerns. Please join us for OptivCon Dallas, a local, exclusive one-day summit where you’ll learn how to reduce enterprise risk and realize stronger, simpler and less costly cybersecurity programs. This complimentary event gives you the ability to connect with your peers and other industry experts to learn how to address some of your biggest cybe...
April 2, 2020
Organizer:
Optiv Location:
Dallas, TX
Gigamon FireEye Integration Webinar
Join Ardalyst, FireEye, Gigamon, and Carahsoft for a complimentary webinar to discuss the development of innovative Security Operations Centers (SOCs) of the Future. Project Medici Moons is an Ardalyst Defense design for a next-generation set of SOCs with technical innovations that will enhance threat awareness/validation and response in an ever-changing cyber environment.Ardalyst's design is a comprehensive hybrid/passive active defense desig...
Software Supply Chain: Code-to-Code Combat
Is your agency doing everything it can to protect against foreign interests from hacking the software that it relies on? From third party software libraries to in-house developed applications to PowerShell scripts, code signing is a necessary component to securing your software infrastructure. Code signing is effective at ensuring that the code you execute comes from where it claims to come from and hasn’t been modified by a third party....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.