Breaking Down Zero Trust Strategies wit...
Zero trust is at the cornerstone of every agency’s cybersecurity plan. You didn't need the Cybersecurity Executive Order (EO 14028) to mandate it. Yet it raises many questions, despite reams of guidance from NIST, CISA, and OMB. With the recent release of OMB’s Zero Trust Strategy, agencies have a clearer roadmap on the technologies needed and path they need to take. Like any other major transformation, to succeed, each agency is c...
Innovative Practices to Communicate wit...
For more than two years the COVID-19 public health emergency has continued to present unprecedented challenges for government agencies providing citizens with health coverage. While finally, an end to the pandemic is in sight, citizens will continue to hold the government to high standards of communication - demanding speed, efficiency, and accuracy when it comes to the continuation of their post pandemic health care needs. Join Salesforce to...
Adobe JELA AEM Forms Lunch and Learn
Adobe, Carahsoft, and Emergent are excited to invite current Adobe Joint Enterprise License Agreement (JELA) enrollees to the first session of our Adobe Experience Manager (AEM) Forms Lunch and Learn series. Please join us on Wednesday, March 9th at 12pm Eastern to hear Adobe's Solution Consultant, Michelle Hellmuth, Sr. Solution Architect, Jason Dausy, and Sr. Customer Success Manager, Shirin Butler review: What's included within the AEM Form...
Accelerate Cloud Development
We know that in academic research labs, scientists are often asked to spin up research modules in the cloud to create more flexibility and collaboration opportunities for their projects. This can be difficult, however, if you don't have the necessary cloud skills. This is where the new RAD Lab solution comes into play. Join Google Cloud and Carahsoft to hear how RAD Lab was designed to help public sector and academic organizations stand-up clo...
AWS ACE Submissions Training
Join AWS and Carahsoft on March 10th to learn about the APN Customer Engagements (ACE) Program at AWS. After this training, you will be able to get started with ACE, share and collaborate with AWS Sales on mutual customer engagements, and manage these engagements until they are launched.
Compliant and Secure Records Management...
Join us to learn more about: How to assess all physical record collections to determine those which need to be destroyed, digitized or sent to Federal Record Centers How to design, fund, and implement a digitization and cloud-based records management program Strategies to streamline information governance and security through content classification How to leverage the power of the cloud to scale your compliance and content management efforts M...
Zscaler + Saasyan: Comprehensive, Cloud...
K-12 schools asked and we listened. Finally, cyber threat and data loss prevention intertwined with student safety delivered as a cloud-native SaaS solution. Join Zscaler and Saasyan on March 10th, and see how they are revolutionizing online student safety with comprehensive inline detection and prevention of cyber bullying and self-harm activity. In this webinar, you'll learn more about: How the Zscaler Zero Trust Exchange utilizes its indust...
Explore TIC 3.0 Multi-Cloud Networking...
Are you and your agency interested in a Trusted Internet Connection (TIC) 3.0 architecture pattern that delivers high-performance encryption (75Gbps+), as well as intelligent routing, advanced security, and cyber visibility? Join Aviatrix and Carahsoft to explore the approved TIC 3.0 architecture using the Multi-Cloud Networking and Security Platform. This platform is authorized to operate as a cloud-based TIC 3.0 Policy Enforcement Point and...
Meeting the Requirements of the Preside...
President Biden recently signed Executive Order 14028 - "Improving the Nation's Cybersecurity" mandating cybersecurity improvements across the Department of Defense and the intelligence community. With the goal of modernizing cybersecurity defenses and protecting federal networks, this new mandate gives identity teams an aggressive timeline for delivering Zero Trust Architecture and other key initiatives. Join Radiant Logic on Thursday, March...
Prioritized Remediation for CMMC Compli...
Cyturus Technologies, Armis, and Carahsoft have assembled a panel of seasoned industry veterans and innovators to demonstrate proven methods for assisting your organization in identifying managed and unmanaged assets, devices, and software, measuring specific risks, and then creating systems and processes for enforcement automation, threat alerting, and prioritized remediation actions. During this webinar you will learn how to: Practically app...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.