Back to Search Begin New Search Save Search Auto-Notify
Cybersmart TV: Zero Trust as a Federal...
Adopting a zero trust architecture is certainly not a new concept but its implementation has never felt as urgent as it does now. With sophisticated and tireless cyber threats, a permanently expanded perimeter defining the next normal, and increased support from the current administration to prioritize its advancement, federal agencies are taking unprecedented measures to modernize their security efforts and defend against tomorrow’s att...
Add Favorite
NASA Webcast Series: Data Security for All
VMware, August Schell and Carahsoft would like to offer you the opportunity to view these on-demand sessions on various topics that your organization may be interested in. On-demand: NASA IT Strategic Goal: People Anywhere Workspace: Revitalize Your Agency's Remote Work Strategy NASA IT Strategic Goal: Cyber SecurityCarbon Black: Deploy Advanced Threat Intelligence to Protect What Matters NASA IT Strategic Goal: Cyber SecurityNSX: Stop Cyberat...
Add Favorite
Splunk & Blockchain
Blockchain is more than a transactional database of critical data. Once data is committed onto a blockchain, it is permanent and nearly impossible to manipulate or hack. As such, businesses can operate more efficiently and securely. Businesses are turning to blockchain to solve a wide range of problems including:Quality AssuranceAccounting Contract ManagementSupply Chain ManagementData Protection and an indisputable trail of transactionsIn thi...
Add Favorite
How to Access ARPA and IIJA Funding to...
You're invited to join NetWitness and Carahsoft for a webinar all about these new grant programs and how to best utilize them for your agency. Members of the Grants Office will also be present to answer your application questions. In this webinar, you will learn: How to upgrade your holistic threat intelligence capabilities and access powerful security insights with grant funding All about how rapid end-to-end visibility up-levels your agency'...
Add Favorite
Tableau CRM-Intelligent Experiences For...
During this webinar, we will dive deeper into Tableau CRM, one of the powerful analytics tools of choice at the VA. We will demonstrate how this solution infuses insights into any business process and provides built-in CRM actions enabling users to take action on insights at the right time and in the right place. The demonstration will also cover how users can connect to and analyze data from any source, without leaving the Salesforce platform...
Add Favorite
10 Tips to Perfect Public PDFs
Join our complimentary webinar to learn how to quickly improve the readability and reliability of your PDFs for optimal user experiences with improved security, compression, and searchability features. Specifically, this webinar will explore: Security Tips – remove sensitive metadata, prevent unwanted changes, and learn about sanitization. Readability and Reliability Tips – provide automatic bookmarks, make documents searchable, an...
Add Favorite
What does Zero-Trust Mean to SLED Cyber...
Join Mitch Rosen, Global Director of Solutions Engineering, as he discusses how CISA and OMB's ZTA pillars directly align to ongoing modernization and security priorities of state, local, and educational institutions. In this webinar, topics will include: What are the Zero-Trust pillars and why are they important? How do you augment existing processes with Zero-Trust architecture? As SLED organizations improve their cybersecurity posture, how...
Add Favorite
2022 Procurement Playbook - DOE - DEPAR...
JOIN US FOR - DOING BUSINESS WITH DOE - DEPARTMENT OF ENERGY. The Playbook Series will feature 4 Panelists who cover the following topics on the Department: Small Business Government Agency Representative to cover opportunities, acquisition forecast, and Agency/Department events; McLean Group will cover mergers & acquisitions (M&A) within the vendor community for the specific Agency/Department; Fedmine, LLC will discuss purchasing tren...
Add Favorite
Hardening the Cyber Quiver
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined guidance, we must evolve to meet the demands of cybersecurity while embracing Zero Trust and the enablers of secure infrastructures, continuous monitor...
Add Favorite
Create a Platform for Innovation and In...
Savvy government leaders recognize government transformation cannot happen overnight. Instead, many are discovering the benefits of using SaaS applications to accelerate the migration of on-premises workloads, modernize business processes with cloud applications, and safely drive technology innovation in the cloud. Learn how Oracle Cloud provides an enterprise-level framework to power a range of cloud-based solutions designed for modern day wo...
Add Favorite
Back to Search Begin New Search