Back to Search Begin New Search Save Search Auto-Notify
Protect and Enhance your DNS Security P...
Join this Infoblox webinar to discover why it's critical to protect your DNS infrastructure, how to protect DNS, and how to use DNS to improve your existing layered security approach. The training will address the most common challenges organizations face to mitigate DNS security threats. Attendees will learn how modern DNS security threats circumvent typical security architecture and why DNS-specific security controls are needed today. Infobl...
Add Favorite
Protecting Against Unknown Cyber Threat...
In order to protect against the evolving threat landscape, we must change both IT and user behavior. The rise of zero-day attacks underscores the need for a policy-driven zero-trust architecture. Join us on Wednesday, August 18th, for a live webinar to learn about the critical role zero trust plays in protecting organizations against modern cybersecurity threats. Hear from ThreatLocker experts as they speak on: Best practices to implement in a...
Add Favorite
Northeast 2021 Roundtable Series: Claim...
Join us to learn about Google Cloud's Big Data Analytics & AI/ML capabilities and enable states to process vast amounts of data at scale and accelerate the distribution of claims quickly, efficiently, and accurately. Attendees of this roundtable will learn how to: Leverage AI/ML to reduce improper payments and fraud Identify and prioritize improper payments before funds are distributed, thwarting fraud Reduce the backlog of higher than ave...
Add Favorite
Learn How to De-Risk Applications to Ac...
It is difficult to implement secure, performant, and cost-effective applications that also meet the needs of your users and operators. This webinar will discuss how on-premises application discovery and mapping does all this and more. Attend this webinar to learn about workload performance/cost comparison and the ability to proactively investigate your mission-critical workloads. Attendees will learn how to: Implement a strategy to map and ass...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Enable Zero Trust with Zscaler and AWS
Join us to learn how Zscaler and AWS' partnership can provide agencies with the most secure route to the Cloud while meeting compliance requirements. Together, we supply agencies with a FedRamp-secure, Zero Trust platform enabling users fast access to any application on AWS from anywhere. During the webinar attendees will: Discover how to transform your approach to a Zero Trust Framework while enabling work from anywhere Dive into Zscaler's Fe...
Add Favorite
Prevent & Detect Business Email Comprom...
BEC attacks on city, state, local governments and educational institutions is a major cyber threat hitting organizations today. Across the nation, these attacks present a significant and unique challenge for resource-strapped local governments and educational entities. The FBI reports that 51% of all Cyber losses originate with BEC. Security leaders need strategies that help mitigate these common attacks and get ahead of threat actors today -...
Add Favorite
Nuvolo OT Security Webinar
Why OT Security is CriticalShutdowns of Pipelines, Restaurants, Hospitals, and WarehousesThe increasing use of network connected equipment has helped organizations become more automated. However, this operational technology (OT) can be susceptible to security exploits and vulnerabilities causing possible malfunction. Yet, traditional IT security tools don't do a good job at helping maintenance teams to quickly perform corrective actions. In th...
Add Favorite
Okta Demo Desk
Interested in learning more about Okta? Our team here at Carahsoft will help you understand how Okta helps secure connections between people and technology through their identity cloud. Join this quick, 30-minute demo to get all of your questions answered.
Add Favorite
Tableau Education Series: Return to Campus
The past year has accelerated a digital transformation in higher education universities and K-12 school districts with the move to remote work and online learning while leveraging modern cloud infrastructure. As the future of education becomes increasingly digital, having a secure, reliable data platform that helps deliver better services and streamline business processes with increased transparency is imperative for all education stakeholders...
Add Favorite
Back to Search Begin New Search