Back to Search Begin New Search Save Search Auto-Notify
Recovering from a Destructive Cyber Attack
Threat actors continue to develop better, more advanced tactics to encrypt your organization’s data for ransom, destroying backups along the way to ensure their payday. There are many tools, capabilities and techniques to build resilience to counter these threats, but there are few standards to help. How do you know what to do and whether it will actually protect you? Please join Jim Clancy—SVP, Global Data Protection Sales and Jim...
Add Favorite
FAR Part 52- Solicitation Provisions An...
FAR Part 52 provides instruction on using provisions and clauses in solicitations and contracts, provides those provisions and clauses in full text, and presents a matrix to assist contract writers in selecting clauses applicable to their contracts.
Add Favorite
Splunk Infrastructure Monitoring for Mu...
View this on-demand webinar with Splunk and SHI to learn how our Observability Suite provides a single, consistent user experience across all metric, trace, and log data. We give users a seamless and streamlined workflow for monitoring, troubleshooting, and investigation -- making it easy to go from problem detection to resolution in minutes. Whether you're a front-end developer who needs to know what end customers are experiencing, a back-end...
Add Favorite
Unleashing Data to Advance the National...
View this on-demand webinar where we go over how Splunk aligns with the overarching vision, focus areas, and guiding principles of the newly released Department of Defense (DoD) Data Strategy. Along with that, we see how Splunk meets or exceeds the essential architecture capabilities, and helps you execute the goals necessary to transform the Department into a data-centric enterprise. A team of Splunk experts walk you through the challenges th...
Add Favorite
Build and Deploy Modern Applications wi...
Join CDW-G, VMware, and Carahsoft for an on-demand webcast to learn more about VMware Tanzu. Kubernetes is the defacto container platform for the future of modern applications. CDWG is here to help you deliver a scalable and portable modern application platform, powered by VMware Tanzu. Tanzu is built on upstream Kubernetes and integrated directly into VMware Cloud Foundation (vCF) and VMware vSphere, which runs on every public cloud provider....
Add Favorite
Enabling User Behavior Analytics
WebinarSummary It's All About the Data Most organizations look to HR for the data that drives their identity governance systems. In reality, that's just the start. Accelerating Access to Applications Learn how to utilize attributes to automatically grant and revoke access to applications and best practices onboarding new ones. Matering Data Quality Identity governance solutions serve as the nerve center for user data. By focusing on data qual...
Add Favorite
How to Leverage Zscaler and SaaS to Sim...
With 171 controls and five levels of compliance, organizations contracting within the defense industry will need well-considered policies, procedures, and technological safeguards to adequately meet CMMC requirements. Ridge IT Corporation can bring your company into compliance with an innovative portfolio of technology offerings. Our approach leverages technology from Gartner-recognized software-as-a-service (SaaS) providers such as Zscaler to...
Add Favorite
Improving K-12 Cybersecurity
Do you know what the number one risk is to a K-12 institution's cybersecurity posture and sensitive data? – Your own users! The sudden shift to remote learning has put an even larger target on the back of K-12 education institutions. When it comes to data breaches, the most prevalent path in is through compromised credentials. For this reason, the traditional perimeter is no longer sufficient and districts must take an identity-centric a...
Add Favorite
The COVID-19 Vaccine and Beyond: Transf...
If there's one thing COVID-19 has taught us, it's that search has never been more critical. Citizens have flooded state and local government websites with questions as they scramble to learn about testing, safety regulations, policy measures, and more. As you prepare for vaccine distribution, how is your organization set up to provide clear, accurate answers to your citizens' questions and meet their expectations? Watch this on-demand webinar...
Add Favorite
How to Catch Advanced Persistent Threat...
View this on-demand webinar to hear Richard White, Cyber Security Architect from Tennessee DOT, and Val Bercovici, CEO and Co-founder of Chainkit, explain how the Department of Transportation's solution architecture and Chainkit's eXtended Integrity Monitoring (XIM) platform overcomes the critical integrity gap, protects all systems and data from a SolarWinds-style attack, and reduces DOT's cyber liability premium by 80%. In this on-demand you...
Add Favorite
Back to Search Begin New Search