Back to Search Begin New Search Save Search Auto-Notify
A Zero Trust Approach to Secure Operati...
The increased risk of cyber-attacks targeting Operational Technology (OT) systems and third-party remote access has skyrocketed in our new hybrid world. Agencies working in converged IT/OT industrial environments must achieve complete visibility, security, and control of operations, and they must understand what third-party vendors (suppliers/contractors) and internal privileged users (operators/admins/remote workers) are doing with their acce...
Add Favorite
More Channels, More Problems: Is Your T...
Students expect their university to provide digital experiences with improved levels of personalization, efficiency and ease-of-use. To meet those demands, school's need to determine which of their current digital solutions are effective and useful, and which are due for a reevaluation. Join Acquia and Mediacurrent experts online as they discuss the higher education technology landscape and the most effective ways to deliver enhanced student e...
Add Favorite
Understanding CMMC Requirements for Hig...
Join Jamie Marshall, Scott Friedman, and Steve Bond, as they discuss: What is included in the November 2021 release of CMMC 2.0 How CMMC impacts educational organizations and why you need to take action How to assess your organization’s readiness to meet CMMC requirements What a CMMC Audit entails and how to prepare your organization to pass An overview of AWS and CloudHesive tools that help you meet your CMMC challenges
Add Favorite
The State of the Phishing Landscape
You don't have to look far to find a headline about a recent breach or compromise within any sector but from a public sector, phishing was behind 70% of government breaches. As threat actors continue to innovate their approach to lure unsuspecting end users with clever, relevant, and timely phishing attacks, and this is showing no signs of stopping. Every corner of the public sector, whether it be education, federal, state, and local agencies...
Add Favorite
4 Ways to Expand Accessibility to Onlin...
Are you looking for a way to give the elderly, poor, and rural residents access to your online meetings? Join this complimentary webinar to discover the four main accessibility challenges with online meetings and how to address the uniqueness of each challenge. Specifically, this session will cover: The cost, risk, and impact of not addressing accessibility challenges with online meetings The statistics around the size of the accessibility iss...
Add Favorite
Mission First: DoD and National Securit...
Tune in to be the first to hear our podcast dedicated to covering the latest and greatest in IT advancements - keeping you ahead of the competition. Attendees will hear from Keith Nakasone, former deputy assistant commissioner of acquisition management within the information technology office at the General Services Administration's Federal Acquisition Service and Federal Strategist, VMware and Craig Bowman, Sr. Director - Federal, VMware, who...
Add Favorite
Software Supply Chain Risk Management f...
Mobile application security is a real threat vector. Whether managing existing mobile apps or building your own, the need to test for vulnerabilities on a regular basis is more critical than ever. From the Executive Order to FISMA compliance, the requirement to include mobile app vetting is now upon us. Software supply chain risk management for mobile applications, from large MDM systems to only a handful of 3rd-party created apps, is a diffic...
Add Favorite
Migrating to Splunk IL5 Cloud
Splunk Cloud Platform™ delivers the capabilities of Splunk as Software-as-a-Service (SaaS), enabling you to make confident decisions and take decisive action on insights from your data without the need to purchase, manage, and deploy additional infrastructure. Ensure fast time to value, security, and reliability by outsourcing your infrastructure management and admin tasks to Splunk, so your employees can focus on core, high-priority act...
Add Favorite
Real Life NSX-V to NSX-T Migration Succ...
VMware understands that migrating your organization from a complex set of NSX-V networking, Distributed Firewall (DFW), and various NSX-V services such as Load Balancer (LB), and Network Address Translation (NAT) to NSX-T is complicated. With NSX-V well past general support, migrating is now more important than ever! Join VMware, 27 Virtual, and Carahsoft for a webinar where our speakers will spotlight a complex real-life migration success sto...
Add Favorite
Adobe Creative Cloud Webinar Series Rei...
Webinar 2: Design Realistic Prototypes That Tell Your Story and Bring Big Ideas to Life Communicating effectively with constituents is a critical function of the public sector, and in our evolving digital age, agencies must ensure messaging is engaging, informative, and accessible to all members of their audience. As our world becomes more visual, utilizing digital assets throughout communication campaigns is imperative - from graphics, image...
Add Favorite
Back to Search Begin New Search