FedRAMP Webinar
Government agencies strive to secure and modernize critical systems from cybersecurity threats and insider threats. Email is by far the most frequent and prolific source of advanced attacks - more than 90% of advanced attacks start with email. Threat actors continue to adapt tools and techniques across attack types to exploit a range of vulnerabilities, including social engineering to trick people into clicking on malicious attachments or URLs...
Splunk for CMMC Solution
The Splunk for the Cybersecurity Maturity Model Certification (CMMC) solution provides a prescriptive approach for organizations to meet, monitor, and track CMMC's required cybersecurity and compliance practices. The solution's pre-built analytic, dashboards, and workflows provide organizations with a clear path to achieving near-term certification and long-term maturity growth. Join Splunk and Carahsoft for a presentation and demo where we wi...
The Future of Cyber Secure Schools
Keeping students and their data safe while maintaining a modern and engaging learning environment is a delicate balance for K-12 institutions. Schools struggle to continuously comply to industry and legal standards that continue to grow, while faced with limited IT resources. As education continues to make the move into the realm of internet-based and on-demand education, they have to find ways to bring their IT resources into the same spaces....
Digitizing Paper-Based Workflows for Go...
Many government agencies start their digital migration journey by scanning paper documents and forms, and making them available online. It is estimated that over 9 million of these documents and forms exist across state and local governments with thousands more scattered across federal agencies. While scanning paper-based forms and documents was a great start to service delivery in previous years, it is now outdated and inefficient, often resu...
Securing Splunk: Balancing Big Data Ben...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating...
Webinar Series: Innovate and Inspire Wi...
Whether you are an expert designer or just starting, Adobe Creative Cloud (CC) encompasses a wide array of industry-leading design applications built to bring any idea to life! This complimentary on-demand webinar series will explore how Adobe is inspiring government agencies nationwide to elevate their use of creativity and design through state of the art digital solutions. Join us to learn how to quickly design engaging digital experiences,...
Webinar Series: Innovate and Inspire Wi...
Whether you are an expert designer or just starting, Adobe Creative Cloud (CC) encompasses a wide array of industry-leading design applications built to bring any idea to life! This complimentary on-demand webinar series will explore how Adobe is inspiring government agencies nationwide to elevate their use of creativity and design through state of the art digital solutions. Join us to learn how to quickly design engaging digital experiences,...
Webinar Series: Innovate and Inspire Wi...
Whether you are an expert designer or just starting, Adobe Creative Cloud (CC) encompasses a wide array of industry-leading design applications built to bring any idea to life! This complimentary on-demand webinar series will explore how Adobe is inspiring government agencies nationwide to elevate their use of creativity and design through state of the art digital solutions. Join us to learn how to quickly design engaging digital experiences,...
Secure Your Data with Seagate's TAA ...
Join Seagate Government Solutions in their upcoming webinar as they discuss the importance of security at the data storage level, and how to build safe IT systems with their secure drives. Bill Downer, Vice President of Seagate Government Solutions, will explain the various benefits and capabilities of Seagate's products in this webinar. Their products provide validated and encrypted data storage capabilities, which assures enterprise owners t...
Identity 3.0 for the Department of Ener...
The Department of Energy has spent years deploying legacy Identity Management (IDM) solutions and Privileged Access Management (PAM) solutions - many having spent millions on deployment, infrastructure, maintenance, and staffing. Little value gained in return - countless hours of effort focused on a handful of systems, directories, or databases with no significant improvement to compliance and security. As agencies move toward digitally transf...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.