Back to Search Begin New Search Save Search Auto-Notify
PeopleSoft Best Practices: Secure Acces...
As the core of your organization, sensitive data inside PeopleSoft has become a top target for malicious threats. Both internally and externally. With native PeopleSoft security and compliance features trying to keep up with modern threats, organizations must evaluate strategies to strengthen authentication and gain deeper visibility into user activity. Join Appsian and Carahsoft, during their webinar, as PeopleSoft experts at Appsian discuss:...
Add Favorite
Other Transactions - Frequently Asked Q...
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
Add Favorite
SAP ERP Best Practices: Strengthen Acce...
As the core of your organization, the business risks inherent with users executing transactions inside SAP can be costly, time-consuming to remediate, and damaging to an organization's reputation. With native SAP security and compliance features failing to keep up with today's dynamic threats, organizations must evaluate strategies for strengthening access controls and gaining deeper visibility into user activity. Join Appsian and Carahsoft, d...
Add Favorite
FAR Part 8- Required Sources of Supplie...
This part deals with prioritizing sources of supplies and services for use by the Government.
Add Favorite
Let's Take This Online
Have you been hesitant to make the switch to virtual classrooms? Maybe you have one, but just don't like using it. There are so many things to love about in-person classroom interactions - seeing your trainees face-to-face, answering their questions as they come up, and breaking them into groups to discuss and learn from each other. Besides, you love sitting in traffic on your way to work, traveling to remote offices to train other teams, and...
Add Favorite
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
Add Favorite
Fact Vs. Myths Of OTA's
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
AvePoint Webinar: Debunking Myths: Nati...
Join AvePoint for a free webinar where we will debunk some of the more popular myths to show you how to maximize your coverage using native capabilities. Native Office 365 retention capabilities are often undersold by third-party backup vendors, leading agencies to second guess what level of data protection they actually need. The reality is that native safeguards, when managed correctly, can be the right choice for certain agencies to cover c...
Add Favorite
Splunk Enterprise Security for the Army
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous monitoring, incident response, SOC operations, and providing executives a window into business risk.Join Splunk and Carahsoft for a pr...
Add Favorite
Back to Search Begin New Search