Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Understand and Leverage Breached Data w...
Cyber-enabled crimes and frauds are extensive, can be highly advanced, and are becoming more and more common, leading to a loss in data, reputation, and funds. Organizations and businesses protecting from cyber-attacks require the collection and analysis of all types of data, including data that has appeared in breaches perpetrated by these cyber-attacks. Join us for this webinar to discover: Data breach trends and how this data can be used Ho...
Part 2 Trend Micro & Four Points Webinar
Register for this webinar to learn how your agency can use a tool that can identify risk, mitigate, report, and alert on compliance gaps in your cloud infrastructure. Regardless if you have one primary Cloud Service Provider or benefit from many!Attendees of this webinar will learn to:Address NIST 800-53 and 800-171 controls Mitigate misconfiguration of your cloud infrastructureQuickly stand up workloads while meeting ATO regulatory objectives...
Work Smarter Through Automation
You are invited to join SailPoint and Column Highmetric on Thursday, May 14th for a live webinar to learn how to work smart and stay safe through the automation integration with ServiceNow. SailPoint's integration with ServiceNow allows service requests to be created and fulfilled according to your organization's policies. With rising helpdesk costs, streamlining access fulfillment is the easiest way to increase your ROI, and maintain a secure...
MVISION Cloud Security Solutions for Mi...
With our current environment, cloud applications usage and data traffic are at a peak. Business continuity, productivity, and security are priorities. View this on-demand webinar from McAfee and Carahsoft to learn how McAfee helps organizations securely accelerate their business by providing total control over data and user activity in Office 365 and Teams. In this on-demand webinar, you will learn more about how McAfee MVISION Cloud for Offic...
Google Cloud Webinar Series: Augment Em...
Please join Google Cloud and Carahsoft for a webinar to demonstrate capabilities both within G Suite and Google Cloud Platform to detect, identify, and remediate end-user security events. Learn how public sector entities can respond to successful phishing attacks that impact other assets on the network, and take Google's approach in isolating the attack vector. During this webinar, you will learn about: End-to-end incident management, from end...
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Infinera Live Virtual Federal Tradeshow
Teleworking and telecommunication networks have become a necessity in helping people stay connected and productive. With the cancellation of trade shows and restrictions on face-to-face interaction, it has become harder to stay up-to-date on the latest networking innovations.Infinera is leading the industry with their latest revision of the Infinate Capacity Engine (ICE6) delivering unbreakable records in both capacities and reach. XR Optics d...
Attending to the Unattended: RPA Crytog...
U.S. Federal agencies often require PKI certificate-based authentication to perform Windows Logon and to access public key enabled systems. This requires use of a multi-factor authentication token that performs a cryptographic operation using the certificate and keys residing within the token. Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a pol...
Improving the Citizen Experience throug...
Legacy systems, infrastructure, policies, and processes all prevent government agencies from delivering programs and applications that meet their mission and give citizens better services at digital speed. How can state IT leaders modernize their workflows to provide scalability, transparency, and security while quickly getting fundamental services to their constituents? Join this webinar to learn how the Cook County (IL) Assessment Office's D...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.