Back to Search Begin New Search Save Search Auto-Notify
AWS ACE Submissions Training
Join AWS and Carahsoft on March 10th to learn about the APN Customer Engagements (ACE) Program at AWS. After this training, you will be able to get started with ACE, share and collaborate with AWS Sales on mutual customer engagements, and manage these engagements until they are launched.
Add Favorite
Compliant and Secure Records Management...
Join us to learn more about: How to assess all physical record collections to determine those which need to be destroyed, digitized or sent to Federal Record Centers How to design, fund, and implement a digitization and cloud-based records management program Strategies to streamline information governance and security through content classification How to leverage the power of the cloud to scale your compliance and content management efforts M...
Add Favorite
Zscaler + Saasyan: Comprehensive, Cloud...
K-12 schools asked and we listened. Finally, cyber threat and data loss prevention intertwined with student safety delivered as a cloud-native SaaS solution. Join Zscaler and Saasyan on March 10th, and see how they are revolutionizing online student safety with comprehensive inline detection and prevention of cyber bullying and self-harm activity. In this webinar, you'll learn more about: How the Zscaler Zero Trust Exchange utilizes its indust...
Add Favorite
Explore TIC 3.0 Multi-Cloud Networking...
Are you and your agency interested in a Trusted Internet Connection (TIC) 3.0 architecture pattern that delivers high-performance encryption (75Gbps+), as well as intelligent routing, advanced security, and cyber visibility? Join Aviatrix and Carahsoft to explore the approved TIC 3.0 architecture using the Multi-Cloud Networking and Security Platform. This platform is authorized to operate as a cloud-based TIC 3.0 Policy Enforcement Point and...
Add Favorite
Meeting the Requirements of the Preside...
President Biden recently signed Executive Order 14028 - "Improving the Nation's Cybersecurity" mandating cybersecurity improvements across the Department of Defense and the intelligence community. With the goal of modernizing cybersecurity defenses and protecting federal networks, this new mandate gives identity teams an aggressive timeline for delivering Zero Trust Architecture and other key initiatives. Join Radiant Logic on Thursday, March...
Add Favorite
Prioritized Remediation for CMMC Compli...
Cyturus Technologies, Armis, and Carahsoft have assembled a panel of seasoned industry veterans and innovators to demonstrate proven methods for assisting your organization in identifying managed and unmanaged assets, devices, and software, measuring specific risks, and then creating systems and processes for enforcement automation, threat alerting, and prioritized remediation actions. During this webinar you will learn how to: Practically app...
Add Favorite
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
More Channels, More Problems: Is Your T...
Students expect their university to provide digital experiences with improved levels of personalization, efficiency and ease-of-use. To meet those demands, school's need to determine which of their current digital solutions are effective and useful, and which are due for a reevaluation. Join Acquia and Mediacurrent experts online as they discuss the higher education technology landscape and the most effective ways to deliver enhanced student e...
Add Favorite
Understanding CMMC Requirements for Hig...
Join Jamie Marshall, Scott Friedman, and Steve Bond, as they discuss: What is included in the November 2021 release of CMMC 2.0 How CMMC impacts educational organizations and why you need to take action How to assess your organization’s readiness to meet CMMC requirements What a CMMC Audit entails and how to prepare your organization to pass An overview of AWS and CloudHesive tools that help you meet your CMMC challenges
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
Back to Search Begin New Search