Back to Search Begin New Search Save Search Auto-Notify
FASTTR on AWS: Reduce the Time and Cost...
In this informative webinar, you will learn about getting compliant with NIST security requirements on AWS with our NIST ATO Accelerator that provides: Dedicated government landing zone compliant with FedRAMP and NIST requirements Pre-audited NIST compliant security services for FedRAMP Moderate, NIST, MARS-E 2.0, and FISMA compliance ATO ready package including policies, procedures, and plans
Add Favorite
Scaling Digital Defenses: The Building...
Government agencies continue to expand their digital service offerings, making it easier than ever before for the public to access critical benefits and services online. However, this rapid expansion of digital services has opened the door to unprecedented identity fraud and abuse, costing billions of dollars. In many cases, additional customer friction was introduced for identity verification processes as a mechanism for reducing fraud. But t...
Add Favorite
Operation Work Safer: Eliminate Threats...
Last year, Google announced the start of a $10 billion investment to support on-going initiatives focused on advancing the security of governments around the world and driving transformation across enterprises and organizations. As a part of this commitment, Google is bringing the best of their products and their cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud's Work Safer prog...
Add Favorite
Ransomware Decrypted: Using Microsegmen...
There is no shortage of options to consider for improving your organization’s security posture. However, public sector IT budgets can quickly narrow possible actions. Doing more with less while trying to hold back the explosive growth of novel ransomware is a task that has been assigned to leaders across the country. Choosing the right path means weighing risk against efficacy, effort, and cost. There is no silver bullet to put down the...
Add Favorite
Following the Roadmap to the Cloud
Join Dwayne Tharp, Sr. Business Development Manager of Digital Transformation, DOMA Technologies, as he answers cloud migration questions including: Will a cloud assessment disrupt our team? What tools do you use and what metrics are provided? What are the biggest barriers to migrating? Is the cloud actually cheaper than on-premise solutions? What is an immersion day and why is it helpful?
Add Favorite
6 Steps for Writing a Next-Level Grant...
A new year means new funding opportunities and new challenges. Changes in federal guidance, the government workplace, and the competitive environment require agencies to take a fresh look at ensuring success in 2022. Join our complimentary webinar to learn about the six steps you can take to start writing an effective grant proposal.Specifically, attendees will learn:The six steps to a successful proposal and how to apply these in 2022Which ke...
Add Favorite
"But We've Always Done it This Way...
Join Carahsoft and Blackberry for this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry to explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity - or having a bigger team - does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results
Add Favorite
How to Simplify and Secure IT Operation...
During this webinar, attendees will learn the practical benefits of letting digital assistants take on tedious tasks like account creations, setting up and helping remote workers, data cleansing and performing day-to-day system maintenance.
Add Favorite
Cohesion out of Chaos: Understanding th...
In late January, a National Security Memorandum was signed to improve the cybersecurity of National Security as required by the Executive Order, 14028. This highlighted the need to increase the sharing of information regarding threats, incidents, and risks across agencies to enable a more effective defense. This memorandum requires the need to develop a framework to coordinate and collaborate on cybersecurity and incident response activities....
Add Favorite
You Can't Secure What You Can't See - A...
In an environment where organizations are under constant attack from cyber adversaries, whether they realize it or not, their exposure posture to risk is vastly expanding. Visium's TruContextTM is the solution to provide understandable pinpoint insights, at velocity, of cyber threats. In our new podcast, You Can't Secure What You Can't See - Apply TruContextTM to Your Splunk Data, our speakers discuss how TruContextTM is able to pull data from...
Add Favorite
Back to Search Begin New Search