Remote Automating Mac Services from Ser...
For many organizations, the increased IT demands created by larger remote workforces have exposed a Mac-sized gap in their IT processes. For ServiceNow customers, the stopgap solution is often to use their ServiceNow instance as the front end for a "swivel chair" request/fulfillment model, which can work for a while, but isn't scalable. In this webinar, Jay Wigard from ITS Partners will work through a couple of stories to look at how the ITS J...
Improving National Cybersecurity: Gover...
President Biden’s Executive Order (EO) has accelerated the crucial need to improve U.S. cybersecurity and move towards Zero Trust. When building a true Zero Trust Architecture (ZTA), it’s critical for agencies to understand that security solutions need to work together to provide the best line of defense. Almost every attack today requires a stolen identity or privilege to execute and initially compromise an environment or to move...
Zero Trust Architecture - What You Shou...
While the concept of Zero Trust has been around for some time, the publication of NIST SP 800-207 (Zero Trust Architecture) has provided clarity, definition, and a recommended approach to a Zero Trust Architecture. President Biden's May 12th Executive Order has created a policy for Federal Agencies to adopt a Zero Trust Architecture, which will likely impact State and Local Government agencies, service providers, supply chains, and private ent...
Create Custom Virtual Learning Experiences
Moving training online can prove challenging, requiring organizations and instructors to create a virtual environment that is as effective and engaging as in-person training. With Adobe Connect, users are empowered to deliver virtual training sessions that rival any in-person learning experiences. Join our complimentary webinar to learn how to deliver immersive, live virtual classroom experiences that expand in-person training in a more conven...
Best Practices for Data in Transit Encryption
High speed networks are the critical foundation that supports many of an agency's most vital communications and operations. However, this foundation is at risk of surveillance and attack by increasingly sophisticated cyber criminals and well-funded nation states. These network connections, if unprotected, are proving to be highly vulnerable, leaving sensitive assets exposed. Threats such as shared infrastructure exposure, man-in-the-middle att...
Transforming For The Age of Digital Inv...
Every day around the world, digital data is impacting investigations. Making it intelligent and actionable is what Cellebrite's Intelligence Investigative Platform does best. With an ever-growing variety of digital devices and cloud sources producing volumes of highly valuable data, investigators need intuitive solutions and training to leverage this critical source of evidence when resources are limited. Join us on Thursday, July 29th for a l...
Detect Cellular, Bluetooth, BLE, Wi-Fi...
Carahsoft and Bastille invite you to join us as we learn how to use a device detection and location kit to find unauthorized devices. The Concern:Are wireless and cellular devices coming into, and possibly passing through, the Visiting Room into other areas a concern for your facility? Bastille's Solution: Bastille detects and locates Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. This provides security teams the ability to accurately locat...
Federal Podcast Series: Defining and Le...
Episode 8: Defining and Leveraging DevOps with M&S Consulting Listen to this week's episode with Hazem Hower and Dominic Pucci from M&S Consulting where they will discuss and define DevOps and explain how M&S Consulting leverages this practice when delivering applications and services at a high rate. Listeners will learn how M&S Consulting and Carahsoft can help existing and future clients with their utilization tools that AWS...
Solving STIGs and Automating Compliance...
System Technical Implementation Guidelines (STIGs) are system configuration guidelines provided by the Defense Information Systems Agency (DISA) that are commonly used in the federal and DoD space to meet system compliance requirements when it comes to system configuration. This effort can be extraordinarily complex and time-consuming for the people that are responsible for executing this work. Not only must each system component be configured...
Government Customer Experience & Engage...
Demand for contactless interactions created an urgent need to improve and modify services. With the accelerated adoption of digital efficiencies across all sectors, U.S. constituents noticed a lack of improvement with government services compared to other customer experiences (CX). However, governments are not turning a blind eye to their trailing ratings. The reinstatement of Part 6 of OMB Circular A-11, directing federal agencies to track go...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.