445 past events found
Back to Search Begin New Search Save Search Auto-Notify
E-Signatures And Your Agency
Government agencies are going digital for a multitude of reasons: to streamline services and approval cycles, improve efficiencies, cut costs, reduce paper waste, and meet increasing citizen demands, just to name a few. The use of digital technologies is being mandated at the federal and state level, however, implementing electronic and/or digital signatures raises questions for many government agencies about compliance and the legality of e-s...
September 22, 2016
Organizer: The Adobe Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Innovating the Core: SAP BusinessObject...
Part 4: How to advance your analytics for the digital age with SAP BusinessObjects Enterprise, premium edition To make better-informed business decisions in the digital economy, you need the ability to quickly analyze and share insight across your entire organization. So how do you do this across all user levels in business environments that span a wide range of data sources and devices and incorporate a huge amount of data? SAP BusinessObject...
September 20, 2016
Organizer: SAP
Location: Webcast
Add Favorite
Operationalize Cyber Intelligence in Re...
View our on-demand webcast to learn how you can perform real-time security analytics and threat hunting enabled by the performance and speed of the leading in-memory data management and analysis platform, SAP HANA, and the leading Threat Intelligence platform, ThreatConnect. We will discuss how you can unite people and processes while simplifying data and technologies in your network environment. By the conclusion of this webcast, you will und...
September 15, 2016
Organizer: SAP NS2 Government Team at Carahsoft
Location: Webcast
Add Favorite
Surviving a Modern Cyber Attack with Is...
Join us for an exclusive webcast during which we'll share intelligence and lessons learned from these attacks. In addition, you'll discover:Threat and risk - what's different about the latest ransomware and extortionware cases and how IT teams are approaching the problemVisibility and detection - what IT teams can do to protect their environmentsRemediation and recovery - best practices and lessons learned on how to recover from an attackCyber...
September 7, 2016
Organizer: EMC & Carahsoft
Location: Webcast
Add Favorite
Intelligent Threat Detection in Government
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
August 30, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Can You Benefit From the NIST Cybersecu...
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has been active since February of 2014, yet many organizations still know little about it, or have questions about its intent. Do you need to learn more about the CSF? Should you consider adopting the CSF? View this complimentary on-demand webcast where Ken Durbin, Strategist: CRM & Threat Intel, Symantec, will provide you with a solid understanding of...
August 23, 2016
Organizer: Symantec Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Successfully Manage a Government...
Setting Your Project Up for Success Program and Project Managers (PMs) have the primary responsibility for developing and managing projects according to government requirements and measurable performance standards. They ensure that all activities in the project life-cycle achieve their intended outcomes.This webcast will address the government PM’s role and a number of tools that can be used during performance of the project to ensure a...
July 27, 2016
Organizer: American Management Association
Location: Webcast
Add Favorite
Better Together: Government and Samsung KNOX
The Strongest Mobile Security Platform The Samsung KNOX Platform provides build-in defense grade mobile security for customers who need it most. In fact, Gartner gave Samsung KNOX the most "strong" ratings of any platform for Corporate Managed Security. Samsung KNOX is also the only platform with "strong" ratings for every security control listed in the Corporate Managed Security category according to the report*. For highly regulated industri...
July 21, 2016
Organizer: Samsung KNOX Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Developing a Framework for a Sustainabl...
Learn how to establish, develop, and evaluate a stormwater utility in your community. As the regulatory requirements for stormwater management continue to put financial pressure on municipal governments, more and more communities are either required to implement a stormwater program or improve their existing program to meet NPDES MS4 stormwater permit requirements and capital needs for asset renewal and upgrades. In particular, implementation...
July 15, 2016
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
Trends in Network Modernization and Security
Federal networks are in the midst of a disruptive phase for the first time in more than a decade. Agencies are transforming their infrastructures to take advantage of new technologies in the cloud and on the software layer. Software-defined networking is growing across the government as a means to provide more security with less complex at lower costs, and with greater efficiency. Learning Objectives Discuss the cybersecurity benefits of netwo...
July 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search