Back to Search Begin New Search Save Search Auto-Notify
Cybersecurity Executive Order Challenge...
The recent ransomware attacks on software supply chains have highlighted the need for improved national cybersecurity efforts. The Executive Order on improving the nation's cybersecurity emphasizes the reality that federal agencies are equally exposed to cyber threats as commercial organizations. Register now for Micro Focus' webinar on the Cybersecurity Executive Order Challenges and Strategies. In this webinar, Senior Cybersecurity Executive...
Add Favorite
Email: The Most Significant Threat to Y...
Email remains a significant security threat for organizations because cybercriminals continue to favor email to distribute malware, phishing scams, and spam. Why? Because it works. Email can easily be copied to appear legitimate, and it gets delivered to the end-user, wanted or not. Join Trustwave on Tuesday, July 27th, to hear their Sr. Product Manager unpack the Trustwave 2021 Email Threat Report. You'll have the opportunity to learn about:...
Add Favorite
Simplifying IT Security for the Classro...
Back to business as usual: Ensuring your WAN is secured with GCOM, Fortinet SD-WAN and Carahsoft Network engineering and operations leaders have struggled to incorporate digital innovation initiatives at branch and remote locations due to the limits of traditional WAN infrastructure. SD-WAN is increasingly seen as the solution for addressing these problems. Join Fortinet, GCOM and Carahsoft as we explore a true secure SD-WAN solution to help g...
Add Favorite
Demystifying The Technology Modernizati...
The Technology Modernization Fund (TMF) was enacted as part of the Modernizing Government Technology Act of 2017, with a goal of better securing sensitive Federal systems and data while utilizing taxpayer dollars as efficiently as possible. Earlier this year, the American Rescue Plan Act added $1 Billion dollars to the program. These funds can help agencies (Civilian, DoD, and the Intelligence Community) modernize systems, expand cybersecurity...
Add Favorite
Protecting Public Sector Agencies Again...
The global pandemic has materially increased citizen engagement with government applications across federal, state, local, and education levels. In turn, it has also accelerated cyberattacks and opened up new opportunities for attackers to enrich themselves. Join F5 and Carahsoft for a webinar addressing the why and how of defending public sector agencies against credential stuffing attacks. During this webinar, we will cover: The impact of cr...
Add Favorite
ExtraHop Demo Desk
Agencies today are working across different platforms and environments, creating a complex web of workloads consisting of hardware, applications, and data spread. Whether it's on edge, core, remote workforce, or cloud deployments, visibility is essentially to ensure security within the organization. Now, as a hybrid, multi-cloud, and containerized environments are standing up, unifying security controls across different environments is critica...
Add Favorite
Remote Automating Mac Services from Ser...
For many organizations, the increased IT demands created by larger remote workforces have exposed a Mac-sized gap in their IT processes. For ServiceNow customers, the stopgap solution is often to use their ServiceNow instance as the front end for a "swivel chair" request/fulfillment model, which can work for a while, but isn't scalable. In this webinar, Jay Wigard from ITS Partners will work through a couple of stories to look at how the ITS J...
Add Favorite
Improving National Cybersecurity: Gover...
President Biden’s Executive Order (EO) has accelerated the crucial need to improve U.S. cybersecurity and move towards Zero Trust. When building a true Zero Trust Architecture (ZTA), it’s critical for agencies to understand that security solutions need to work together to provide the best line of defense. Almost every attack today requires a stolen identity or privilege to execute and initially compromise an environment or to move...
Add Favorite
Zero Trust Architecture - What You Shou...
While the concept of Zero Trust has been around for some time, the publication of NIST SP 800-207 (Zero Trust Architecture) has provided clarity, definition, and a recommended approach to a Zero Trust Architecture. President Biden's May 12th Executive Order has created a policy for Federal Agencies to adopt a Zero Trust Architecture, which will likely impact State and Local Government agencies, service providers, supply chains, and private ent...
Add Favorite
Create Custom Virtual Learning Experiences
Moving training online can prove challenging, requiring organizations and instructors to create a virtual environment that is as effective and engaging as in-person training. With Adobe Connect, users are empowered to deliver virtual training sessions that rival any in-person learning experiences. Join our complimentary webinar to learn how to deliver immersive, live virtual classroom experiences that expand in-person training in a more conven...
Add Favorite
Back to Search Begin New Search