Back to Search Begin New Search Save Search Auto-Notify
Ransomware Readiness: What Preparation...
When considering today's evolving threat landscape, it's imperative that organizations have a Cybersecurity Incident Response Plan (CSIRP) and are well educated on ransomware readiness. Both can be achieved with the help of Optiv. Optiv's approach includes a deep evaluation of your organization's current people and processes while simulating adversary tactics, techniques, and procedures (TTPs) in your environment. Optiv's expertise and guidanc...
Add Favorite
How to Build a Data Governance Program...
Building a data governance program can be difficult, and it can be especially hard in areas that tend to fall behind technology-wise. Algonquin College has made a great deal of progress in the areas of reporting, integrations, policy management, and developing its business glossary. This session will go over the dos and don'ts of setting up and maintaining a data governance program. Join us for this webinar, where attendees will: Discover the...
Add Favorite
Data Governance for Enabling the Federa...
Since the 2019 Foundations for Evidence Based Policy Making Act became law, federal agency success in meeting the embedded mandate to inventory and catalog all of their data continues to achieve mixed results. It doesn't have to be that way. Automating these processes and democratizing data for internal and public facing use is within reach now. Customs and Border Protection (CBP), the largest federal law enforcement agency within the U.S. Dep...
Add Favorite
DevSecOps for Public Sector: A Roadmap...
Join Sonatype and Carahsoft during the DevSecOps for Public Sector event series to learn more about eliminating security risks across the entire software delivery lifecycle by securing your software supply chain! Register now for Sonatype's session to learn: How to protect your agency's software from increasing supply chain attacks Why security throughout the development and deployment process is more essential than ever How Sonatype's Nexus p...
Add Favorite
Geosite's Beacon: Enabling Faster Searc...
Traditionally, working with geospatial data in real-time has proven to be very difficult, even for geospatial experts. These limitations are more challenging for first responders and those in the field who must respond to potential life-threatening scenarios in a matter of minutes. Fortunately, Geosite has cracked the code by fusing multiple streams of geospatial data into a single, easy-to-use environment that leverages time-saving productiv...
Add Favorite
Federal Partner Forum: Creating Value f...
Time is all that matters. Time to value, time to detect a threat, and response time are critical. Attacks bypass prevention tools and move across cloud, data center, IoT, and enterprise networks, evading detection. Vectra solves this problem by seeing these attacks in progress to stop breaches. Join us and hear from Vectra’s President and CEO, Hitesh Sheth, and VP of Product Management, Kevin Kennedy, around all things Vectra. Learn how...
Add Favorite
Google Cloud Document AI Webinar
Government agencies handle a high volume of paper and electronic documents. Many re-key information or use unintelligent legacy scanning and storage systems, which is a time-consuming and error-prone process.Join Google Cloud and Carahsoft to learn how to improve operational efficiency by extracting structured data from unstructured documents and making data available to your business apps and users with Document AI. Reduce the friction of ent...
Add Favorite
5 Microsoft Teams Sprawl Best Practices
The power of Microsoft Teams has never been clearer, or more frequently stress-tested, than in recent years. Our collective shift to remote and hybrid working has led to an explosion in Microsoft Teams use (with a whopping 250 million monthly users), and that's not the only thing that's skyrocketed. Security concerns, performance issues, and the need to understand user data have also increased. Learn how to fix it! Join us for a webinar to dis...
Add Favorite
Optimizing the Effectiveness of Your Da...
Join insider risk expert Mark Wojtasiak, VP of Research & Strategy at Code42, to explore the value of taking a proactive Insider Risk Management (IRM) approach to data protection and strategizing ways to avoid data leaks and theft without disrupting productivity or collaboration. This webinar will explore: Why DLP strategies require a layered approach What controls are needed to protect sensitive data from exfiltration How to continuously...
Add Favorite
Observability - Keeping Citizen and Stu...
Splunk’s Observability Suite provides a single, consistent user experience across all metric, trace, and log data. This provides a seamless and streamlined workflow for monitoring, troubleshooting, and investigation – ultimately making it easy to go from problem detection to resolution in minutes. Whether you’re a front-end developer who needs to know what end customers are experiencing, a back-end developer building APIs and...
Add Favorite
Back to Search Begin New Search