Back to Search Begin New Search Save Search Auto-Notify
Protect Your Agency's Domain With a DMA...
Join Valimail and Carahsoft for a live webinar "Why implementing a DMARC solution is the most effective way to protect your agency's domain and reputation." Cybercriminals send 1.3 billion spoofing emails every single day. Are you certain your agency's email is fully protected and authenticated? Protecting your agency from cyber attacks and malicious hijacking of your domain is essential to maintaining your agency's reputation. Valimail Enforc...
Add Favorite
Enhancing Citizen 360 for Human Service...
Aging mainframes and the development of many disparate databases and applications have disconnected key state services, prolonging the time for citizens to benefit from the programs intended to serve them. Modernization approaches that use change-friendly data integration strategies to increase visibility into people and programs are essential to ensuring improved time-to-mission and person-centered outcomes.During this webinar, MarkLogic will...
Add Favorite
Industry Perspectives on CMMC 2.0
With recent discussions about changes to the Cybersecurity Maturity Model Certification (CMMC), Defense Industrial Base organizations can be sure that the intent and desired outcome of the program remains. Join this webinar to hear from experts at Carahsoft, Baker Tilly, and Pillsbury on the evolving CMMC program and what this means for the Defense Industrial Base. Topics include: What are the proposed changes with CMMC 2.0? Why should organiz...
Add Favorite
Adobe Connect Webinar Series: Create Cu...
Creating Custom Pods - Level 201 Revisited Adobe Connect's unique ecosystem of persistent services, including HTML5 Pods, enable extensibility of data, graphic, and system views. With the release of Connect 11, it is easier than ever to create your very own custom pods. Join our Adobe Connect webinar series to improve your Adobe Connect room's functionality and engagement levels. Listen to Adobe experts as they walk through the creation and im...
Add Favorite
Science of Visual Analysis for the Depa...
Is it art? Is it science? Is it both? Visual analysis in an iterative process for working with data that exploits the power of the human visual system. The formal core of visual analysis is the mapping of data to appropraite visual representations. But what exactly engages an audience effectively? Is it beauty? Is it clarity? Is it a great story? Join us for this dynamic conversation in today's world of data visualization.Attend this live webi...
Add Favorite
Top 3 Strategies for Optimizing State a...
The vast and fragmented state, local, and education (SLED) government marketplace can be challenging to navigate without a strategic business development strategy in place. The most successful companies in this space leverage a specific business development plan that is data-driven, forward-looking and efficient to ensure predictable long-term revenue. Take advantage of this free webinar and learn three proven strategies for driving growth in...
Add Favorite
Cybersecurity Executive Order M-21-31:...
The U.S. Office of Management and Budget (OMB) published memorandum M-21-31 this year, which mandates a 24-month implementation deadline and expands upon the Cybersecurity Executive Order. To achieve the ambitious timeframe, federal agencies must adopt technologies that deliver a high level of out-of-the-box support for all requirements. With Securonix and Snowflake, those needs will be fully met. Join Securonix and Snowflake on December 14th...
Add Favorite
AWS Public Sector CIO/CTO Virtual Round...
Tune in for this virtual roundtable as AWS, Kinect Consulting, & Carahsoft discuss local government success with data and analytics. Local governments across the nation are undertaking data and analytics initiatives to improve planning, operations, citizen engagement, and services delivered. This interactive roundtable is designed to help IT leaders learn from data projects at other governments, and to identify their own government's poten...
Add Favorite
Google Workspace Renewals Webinar
Manage data and policies for former employees while retaining access to shared content for current employees. Vault-Former-employee (VFE) licenses can now be converted to Archived User licenses for better management.During this webinar we will learn:What is an Archived User?Why is Archived User required?How to assign Archived User licenses?Google Workspace Archived User pricing
Add Favorite
How To Issue Hardware-Based Identity Cr...
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). For human users, multi-factor authentication is easily facilitated by using a secure smart card or USB token. But what about non-person entities (NPEs), like devices or software? These entities still must have hardware-secured credentials to meet secur...
Add Favorite
Back to Search Begin New Search