Back to Search Begin New Search Save Search Auto-Notify
Negotiating Effective Sub-Contracts
Join JSchaus & Associates (Washington DC based consulting firm) for our 2020 webinar series. Webinars are RECORDED and COMPLIMENTARY. Check our YouTube channel or website for the upcoming schedule and previous recordings. Contact us for help with your federal procurement needs including market analysis, SBA 8a Cert, GSA Schedules, pricing, proposal writing, sales & business development, contract administration and more. Thank you for r...
Add Favorite
Reducing Teleworking Risks with a Softw...
Secure access is not a new challenge for IT operations, but with the accelerated shift to working from home, the need to rapidly scale secure remote access has skyrocketed. The most promising security approaches in place today, like the Cloud Security Alliance's Software Defined Perimeter (SDP) approach, had their start from government approaches. In SDP environments, government data is being accessed more by unmanaged, risky, and potentially...
Add Favorite
Emulating Threat Methodologies
Rapid7 and Carahsoft invite you to join us for a 30 minute webinar that will feature Ben Elser, Senior Security Solutions Engineer at Rapid7, digging into some of the ways attackers are leveraging their older exploits - specifically EternalBlue - on the latest surge of ransomware attacks against the U.S. Public Sector and what you can do to prevent them. Some of the topics we will cover during this brief presentation include: Introduction to T...
Add Favorite
Maintain The Integrity Of Election Systems
In 2019, $425 million were given states due to an ongoing threat to the security of our elections. The Federal Election Commission is looking for ways to secure our national election infrastructure and improve the election administration. Palo Alto Networks helps to ensure the security of our elections and the systems that support our voting process. Our automated tools perform baseline network security posture audits of existing users, applic...
Add Favorite
Understand and Leverage Breached Data w...
Cyber-enabled crimes and frauds are extensive, can be highly advanced, and are becoming more and more common, leading to a loss in data, reputation, and funds. Organizations and businesses protecting from cyber-attacks require the collection and analysis of all types of data, including data that has appeared in breaches perpetrated by these cyber-attacks. Join us for this webinar to discover: Data breach trends and how this data can be used Ho...
Add Favorite
Part 2 Trend Micro & Four Points Webinar
Register for this webinar to learn how your agency can use a tool that can identify risk, mitigate, report, and alert on compliance gaps in your cloud infrastructure. Regardless if you have one primary Cloud Service Provider or benefit from many!Attendees of this webinar will learn to:Address NIST 800-53 and 800-171 controls Mitigate misconfiguration of your cloud infrastructureQuickly stand up workloads while meeting ATO regulatory objectives...
Add Favorite
How to Input Data into your EA Tool
Inputting data into your EA tool requires a practical understanding of how data is stored in the tool. EA is based on the concepts of Artifacts and Relationships. This concept implies that you must have the Artifacts created before you can establish the relationship between them. In this webinar we will present examples of artifacts and relationships found in most EA tools, and then provide examples for creating Excel worksheets to load the da...
Add Favorite
Work Smarter Through Automation
You are invited to join SailPoint and Column Highmetric on Thursday, May 14th for a live webinar to learn how to work smart and stay safe through the automation integration with ServiceNow. SailPoint's integration with ServiceNow allows service requests to be created and fulfilled according to your organization's policies. With rising helpdesk costs, streamlining access fulfillment is the easiest way to increase your ROI, and maintain a secure...
Add Favorite
FAR Part 22- Application of Labor Laws...
This part prescribes general policies regarding contractor labor relations, how to implement pertinent labor law and Executive order, and prescribes contract clauses with respect to each pertinent labor law and Executive order.
Add Favorite
MVISION Cloud Security Solutions for Mi...
With our current environment, cloud applications usage and data traffic are at a peak. Business continuity, productivity, and security are priorities. View this on-demand webinar from McAfee and Carahsoft to learn how McAfee helps organizations securely accelerate their business by providing total control over data and user activity in Office 365 and Teams. In this on-demand webinar, you will learn more about how McAfee MVISION Cloud for Offic...
Add Favorite
Back to Search Begin New Search