Back to Search Begin New Search Save Search Auto-Notify
DevSecOps in a Mission-Critical Environment
The Joint Strike Fighter (JSF) Program is the Department of Defense's focal point for defining next-generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. As the operational tempo has evolved, the requirements of the fleet have the need to develop a new approach to software development and sustainment. This approach is Software Modernization, an effective hybrid of development and sustainment that involves...
Add Favorite
The Call for Digital Transformation: Pr...
Carahsoft and Salesforce partner together to provide the best support for the Government Agencies we serve. Salesforce is excited to invite you to our upcoming webinar, The Call for Digital Transformation: Preparing for the "Next Normal" Join us and hear from our Government Digital Transformation experts share their digital transformation framework that will allow you to take actions now that enable your organization to thrive in the next normal.
Add Favorite
New DHS CISA TIC 3.0 Guidance Makes Clo...
Effective immediately, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) issued new TIC 3.0 guidance allowing agencies to roll out zero trust direct-to-cloud connections through cloud service providers (CSPs) that meet CISA guidelines. This new guidance helps agencies avoid the challenges of VPN, which include infrastructure exposure and highly latent traffic paths due to traffic being forced to tr...
Add Favorite
Decision Science for DoD Resourcing ...
The Department of Defense's ability to fully implement the National Defense Strategy depends on success in the domain of resourcing and reform. This includes executing reform priorities quickly while managing costs efficiently; a challenge that has plagued defense leaders who previously relied on outdated, manually compiled, or incomplete data.Join this complimentary webinar for an exclusive analysis detailing how decision science conveys a cl...
Add Favorite
Defending Aganist Ransomware Attacks
Join our Tenable webinar on defending ransomware through effective vulnerability risk management. Implementing an effective ransomware defense strategy is not an impossible task. By ensuring proper implementation of basic cyber hygiene practices across the organization and focusing limited resources first on what matters most in terms of vulnerability remediation, public sector organizations can transform themselves from "soft" to "hard" rans...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
UiPath Higher Ed RPA Summit
UiPath considers education a core value and demonstrates it through our Academic Alliance. We invite you to join us at our virtual Higher Ed RPA Summit, where we will discuss our powerful RPA enterprise platform. Whether you are a student interested in learning about RPA as a career, or an administrator trying to control cost and create efficiencies, this webinar will address your interests. From government to business and now to educational i...
Add Favorite
How to Deliver NIAP Compliant Mobile Ap...
The National Institute of Standards and Technology has partnered with the Department of Defense and several federal agencies to create a standardized mobile app vetting process for the National Information Assurance Partnership (NIAP) compliance. In 2019, NowSecure partnered with the U.S. Air Force to kick off the creation of an automated software security testing solution to enable NIAP compliance for mobile apps. This is an easy-to-use solut...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Emulating Threat Methodologies
Rapid7 and Carahsoft invite you to join us for a 30 minute webinar that will feature Ben Elser, Senior Security Solutions Engineer at Rapid7, digging into some of the ways attackers are leveraging their older exploits - specifically EternalBlue - on the latest surge of ransomware attacks against the U.S. Public Sector and what you can do to prevent them. Some of the topics we will cover during this brief presentation include: Introduction to T...
Add Favorite
Back to Search Begin New Search