Strategic Use of Federal Funds Availabl...
Join Fortinet and Carahsoft for an in-depth review of the current state of federal funding for K-12. Educational institutions are often the target of cyberattacks, but have limited resources to deploy in defending against them. The pressure on IT and security experts in educational institutions to do more with less is constantly increasing as well. During this webinar, participants will learn about: Federal funding that is currently available...
Zero-Trust Mobile Application Environment
With the pandemic, the DOD has to depend on and leverage mobility even more. This has only increased the demand and desire for more first and third party applications to be deployed. With the rush of demand comes the struggle to deploy without SOP's. NowSecure can optimize your mobile AppSec pipeline to meet that demand.With the push for these new mobile applications, many agencies have discovered there is a need for integrated continuous test...
New AI Insights, Same Familiar Interface
Integrating artificial intelligence (AI) and machine learning into existing analyst tools and applications is a sure way to accelerate adoption and enhance mission-critical decision-making. Learn how the Modzy extension for Tableau provides knowledge workers access to even more analytical insights, powered by a centrally governed library of AI and machine learning models. This session will focus on the importance of integrating model operation...
Simplifying Hybrid Cloud Deployment wit...
Join Palo Alto Networks, Squadra Solutions, and Carahsoft Technology as we host a webinar focusing on Palo Alto Networks' powerful secure access service edge (SASE) solution called Prisma® Access. We will be discussing how their generation SASE can scale and secure your agency's mission applications in the cloud. Prisma Access provides identity-based Zero Trust Network Access with the best-in-class security - including threat monitoring fo...
CXO Cheat Sheet: Complying with the Fed...
With the release of OMB's Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. The strategy further codifies the importance of moving off of legacy security infrastructure to embrace a Zero Trust architecture. But as agencies rush to develop Zero Trust implementation plans, they must carefully consider key aspects of their deployment or risk co...
Innovating the Way the DoD Does Business
In this upcoming webinar, subject matter experts will discuss how we are transforming business processes to aggregate data and facilitate innovation in the DoD. While innovation takes many forms, by-products, and opportunities, agencies and departments need to be able to understand their data scope so they can discover, analyze, redirect, take action, and ultimately innovate.That's where CORAS is the pivotal SaaS tool. We use business intellig...
Simple Charts and Mapping Criminal Activity
Learn how Tableau makes it simple to visualize and share insights in a way that's easy to understand for executives, decision makers, Special Agents, or law enforcement partners. This webinar will help you discover the key attribute that makes Tableau so important, that you can quickly discover new insights. Attend this live webinar from Tableau to: Learn how to select the right chart to best communicate your data Discover simple formatting tr...
REAL ID and Proof-of-Identity Automation
Technology advancements, like Artificial Intelligence (AI), are enabling state agencies to automate like never before. Challenges such as augmenting human review of incoming documents, handling the transition to REAL ID, and preventing fraud must be considered when deciding which technologies to utilize. This webinar series will ensure that you are aware of the latest options to tackle your agency's document demand.Join us for this webinar, wh...
Get More Out of Your Gigamon
The goals and milestones prescribed in OPM Memorandum M-21-31 seem almost impossible to achieve, which include improving the capabilities related to cybersecurity incidents. Join Gigamon and Carahsoft to learn how Deep Observability can help you fast-track your compliance with the Memorandum's objectives all-the-while achieving a foundation for a scalable Zero Trust Architecture. In this complimentary webinar, we will discuss: What M-21-31 is...
6 Steps for Writing a Next-Level Grant...
A new year means new funding opportunities and new challenges. Changes in federal guidance, the government workplace, and the competitive environment require agencies to take a fresh look at ensuring success in 2022. Join our complimentary webinar to learn about the six steps you can take to start writing an effective grant proposal.Specifically, attendees will learn:The six steps to a successful proposal and how to apply these in 2022Which ke...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.