Back to Search Begin New Search Save Search Auto-Notify
Successfully Navigate the Convergence o...
In this webinar, attendees will learn: How to overcome internal control siloes and the increasing Importance of Cross-Application GRC Overcoming challenges posed by elevated or privileged access requirements Why Continuous Controls Monitoring should be at the heart of your GRC strategy Best practices for evaluation solutions
Add Favorite
MAXimize Your Creative and Document Workflows
At this year's Adobe MAX Creativity Conference, guests got the inside scoop into the future of Adobe Creative Cloud. Attendees witnessed captivating demonstrations on new updates to your favorite applications, as well as brand new rollouts such as Adobe Firefly Artificial Intelligence (AI). Adobe has launched innovations across Creative Cloud applications, with Document Cloud integrations that will accelerate content creation at the speed of g...
Add Favorite
MOSAICS and the Future of Industrial Cy...
As the vulnerability of industrial control systems (ICS) to cyberattacks continues to have a clear impact on infrastructure security, emerging security solutions are essential to the future of industrial cybersecurity. MOSAICS – More Operational Situational Awareness for Industrial Control Systems – is the working prototype demonstrating an integrated capability for ICS operational defense. This roundtable discussion pulls together...
Add Favorite
Pain-free, Controlled Technology Migrat...
Migrating cloud services, databases, and APIs can mean using an all-or-nothing approach that is risky, costly and time-consuming, putting your agency at risk of infrastructure routing complexities and user experience challenges that can slow down or even halt agency modernization efforts. Join LaunchDarkly online on November 14 to discover better, safer ways to migrate your agency’s tech stack and turbocharge your agency’s moderniz...
Add Favorite
Introduction to Advanced Analytics with...
Join Alteryx for an interactive session on conducting end-to-end analysis. To start off, we will unpack how federal, state, and local agencies are utilizing data driven approaches to enhance their operations, including reconciliation, risk assessment, and data deduplication. After a brief introduction to the possibilities, you'll go hands-on and learn how to apply these techniques for yourself. You will learn how to bring in and merge differe...
Add Favorite
DevSecOps: A Shift Left for Security an...
The success of federal agencies hinges on modernization. As such, a growing number of government programs are adopting DevSecOps methodologies but struggle to harness its full potential. With Atlassian's Jira Software and Confluence, agencies can make the most of their adoption by streamlining workflows and boosting agility. Join Atlassian experts on November 15th to explore: Use cases on federal agencies modernizing their systems using A...
Add Favorite
Leveraging Delinea Server PAM for Smart...
Smart cards provide an enhanced level of security for Linux computers when users log on to Active Directory domains. If you use a smart card to log on, authentication requires a valid and trusted root certificate or intermediate root certificate that can be validated by a known and trusted certification authority (CA). Because smart cards rely on a public-private key infrastructure (PKI) to sign and encrypt certificates and validate that the c...
Add Favorite
Showcasing the Power of a Unified Secur...
Join us on November 15th for this CrowdStrike webinar where we will take a deeper dive into the benefits LogScale can provide security experts.
Add Favorite
The Industry's First Unified Observabil...
Join Riverbed and Carahsoft for a live webinar that breaks down how organizations can keep pace with modernization initiatives and technology advancements. By taking a step back and evaluating your IT infrastructure, you can achieve Unified Observability. During this webinar, Riverbed's VP of Americas West, Charlie Bollom, will explain: The different levels of IT maturity along the Unified Observability Journey The difference between reactive,...
Add Favorite
Avoiding Log4j Vulnerabilities: Securin...
Most of today's government organizations operate using proprietary or "first-party" software. These proprietary applications (ie. GOTS tools) present a challenge as they receive limited support from off-the-shelf security platforms, which leaves organizations more vulnerable to hidden vulnerabilities within their custom solutions. Join Qualys on November 29th for a live webinar where you will learn: How enhancements will allow customers to cre...
Add Favorite
Back to Search Begin New Search