Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
Cybersecurity Executive Order M-21-31:...
The U.S. Office of Management and Budget (OMB) published memorandum M-21-31 this year, which mandates a 24-month implementation deadline and expands upon the Cybersecurity Executive Order. To achieve the ambitious timeframe, federal agencies must adopt technologies that deliver a high level of out-of-the-box support for all requirements. With Securonix and Snowflake, those needs will be fully met. Join Securonix and Snowflake on December 14th...
Add Favorite
Secure Collaboration in M365 within a Z...
Microsoft 365 quickly brings together collaborators across your agency and your partners. That built-in collaboration, however, creates new concerns around tracking who has access across your environment. Organizations must monitor how users interact with data within a Zero Trust Architecture. The recent Executive Order on Cybersecurity focused on federal networks when implementing a Zero Trust Architecture, causing IT organizations to shift t...
Add Favorite
Making Sense of CMMC
Carahsoft and Cyturus bring a panel of seasoned industry veterans and innovators to provide you with proven ways to help your organization be prepared to meet the objectives of Cybersecurity Maturity Model Certification (CMMC) and other requirements as well as provide you with an ongoing model for continual improvement and prioritized risk remediation. During this webinar you will learn: How to best address CMMC for your organization How to es...
Add Favorite
Ransomware Readiness: What Preparation...
When considering today's evolving threat landscape, it's imperative that organizations have a Cybersecurity Incident Response Plan (CSIRP) and are well educated on ransomware readiness. Both can be achieved with the help of Optiv. Optiv's approach includes a deep evaluation of your organization's current people and processes while simulating adversary tactics, techniques, and procedures (TTPs) in your environment. Optiv's expertise and guidanc...
Add Favorite
Three Keys to Fulfill New Cybersecurity...
Join AWS, Wickr, Presidio Federal and Carahsoft to explore how together we can help your agency meet fulfill these requirements with ease – from creating a plan to accelerate cloud adoption, building architectures with a zero-trust security model, and increasing your overall environments visibility for security and compliance purposes. You will walk away with invaluable knowledge on how to: Adopt easy to use, secure multi-factor authoriz...
Add Favorite
FCW Workshop: Public Safety
From wildfires and hurricanes to increasing crime rates and the continuing pandemic, public safety organizations at all levels of government find themselves spread thin these days. However, a continued wave of technology innovations can help fill their need for better data, quicker response and effective delivery of services. The move of many public safety organizations to the cloud has opened new options for using and sharing operational data...
Add Favorite
CXO Cheat Sheet: Complying with the Fed...
With the release of OMB's Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. The strategy further codifies the importance of moving off of legacy security infrastructure to embrace a Zero Trust architecture. But as agencies rush to develop Zero Trust implementation plans, they must carefully consider key aspects of their deployment or risk co...
Add Favorite
Get More Out of Your Gigamon
The goals and milestones prescribed in OPM Memorandum M-21-31 seem almost impossible to achieve, which include improving the capabilities related to cybersecurity incidents. Join Gigamon and Carahsoft to learn how Deep Observability can help you fast-track your compliance with the Memorandum's objectives all-the-while achieving a foundation for a scalable Zero Trust Architecture. In this complimentary webinar, we will discuss: What M-21-31 is...
Add Favorite
Operation Work Safer: Eliminate Threats...
Last year, Google announced the start of a $10 billion investment to support on-going initiatives focused on advancing the security of governments around the world and driving transformation across enterprises and organizations. As a part of this commitment, Google is bringing the best of their products and their cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud's Work Safer prog...
Add Favorite
"But We've Always Done it This Way...
Join Carahsoft and Blackberry for this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry to explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity - or having a bigger team - does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results
Add Favorite
Back to Search Begin New Search