Back to Search Begin New Search Save Search Auto-Notify
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Understand and Leverage Breached Data w...
Cyber-enabled crimes and frauds are extensive, can be highly advanced, and are becoming more and more common, leading to a loss in data, reputation, and funds. Organizations and businesses protecting from cyber-attacks require the collection and analysis of all types of data, including data that has appeared in breaches perpetrated by these cyber-attacks. Join us for this webinar to discover: Data breach trends and how this data can be used Ho...
Add Favorite
Part 2 Trend Micro & Four Points Webinar
Register for this webinar to learn how your agency can use a tool that can identify risk, mitigate, report, and alert on compliance gaps in your cloud infrastructure. Regardless if you have one primary Cloud Service Provider or benefit from many!Attendees of this webinar will learn to:Address NIST 800-53 and 800-171 controls Mitigate misconfiguration of your cloud infrastructureQuickly stand up workloads while meeting ATO regulatory objectives...
Add Favorite
Work Smarter Through Automation
You are invited to join SailPoint and Column Highmetric on Thursday, May 14th for a live webinar to learn how to work smart and stay safe through the automation integration with ServiceNow. SailPoint's integration with ServiceNow allows service requests to be created and fulfilled according to your organization's policies. With rising helpdesk costs, streamlining access fulfillment is the easiest way to increase your ROI, and maintain a secure...
Add Favorite
MVISION Cloud Security Solutions for Mi...
With our current environment, cloud applications usage and data traffic are at a peak. Business continuity, productivity, and security are priorities. View this on-demand webinar from McAfee and Carahsoft to learn how McAfee helps organizations securely accelerate their business by providing total control over data and user activity in Office 365 and Teams. In this on-demand webinar, you will learn more about how McAfee MVISION Cloud for Offic...
Add Favorite
Google Cloud Webinar Series: Augment Em...
Please join Google Cloud and Carahsoft for a webinar to demonstrate capabilities both within G Suite and Google Cloud Platform to detect, identify, and remediate end-user security events. Learn how public sector entities can respond to successful phishing attacks that impact other assets on the network, and take Google's approach in isolating the attack vector. During this webinar, you will learn about: End-to-end incident management, from end...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Infinera Live Virtual Federal Tradeshow
Teleworking and telecommunication networks have become a necessity in helping people stay connected and productive. With the cancellation of trade shows and restrictions on face-to-face interaction, it has become harder to stay up-to-date on the latest networking innovations.Infinera is leading the industry with their latest revision of the Infinate Capacity Engine (ICE6) delivering unbreakable records in both capacities and reach. XR Optics d...
Add Favorite
Attending to the Unattended: RPA Crytog...
U.S. Federal agencies often require PKI certificate-based authentication to perform Windows Logon and to access public key enabled systems. This requires use of a multi-factor authentication token that performs a cryptographic operation using the certificate and keys residing within the token. Traditional multi-factor authentication introduces roadblocks to technologies like Robotic Process Automation (RPA). The OMB Memo M-19-17 outlines a pol...
Add Favorite
Improving the Citizen Experience throug...
Legacy systems, infrastructure, policies, and processes all prevent government agencies from delivering programs and applications that meet their mission and give citizens better services at digital speed. How can state IT leaders modernize their workflows to provide scalability, transparency, and security while quickly getting fundamental services to their constituents? Join this webinar to learn how the Cook County (IL) Assessment Office's D...
Add Favorite
Back to Search Begin New Search