Back to Search Begin New Search Save Search Auto-Notify
How to Scale and Modernize Agency Infra...
When migrating legacy, on-premise infrastructure to AWS Cloud, it is imperative for government agencies to implement new monitoring and alerting frameworks to reflect the nature of the new Cloud environment. This informative webinar will showcase how to seamlessly modernize, migrate and scale cloud infrastructure to deliver reliable, secure and user-friendly FedRAMP compliant citizen services. The presentation will include a government case st...
Add Favorite
Strong Security Starts with Strong IT O...
Splunk ITSI is a premium analytics solution that correlates and applies machine learning to infrastructure, application, and business data for 360° service monitoring, predictive analytics, and streamlined incident management. Unlike point event management or IT monitoring solutions, ITSI correlates and applies machine learning to metric, log, and trace data for end-to-end intelligence across your entire environment. ITSI also combines vie...
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Build a Scalable and Secure CI/CD Pipel...
Join our experts to learn how teams inside Department of Homeland Security (and DHS components) can deploy Splunk, GitLab, and D2iQ together to support CI and CD process automation, securely accelerate application development and deployment, and lay the groundwork for continued modernization and innovation.During this webinar, attendees will learn:How to secure each stage of the development lifecycle through GitLab (SAST, DAST, Container Scann...
Add Favorite
Migrate Your City's Infrastructure With...
Migrate your legacy IT infrastructure to the Cloud for a range of services focused on improving the efficiency and reliability of your IT – and setting up your infrastructure to deliver modern, digitized services to your residents. Join us to learn about the benefits of shifting to the Cloud as we walk through a case study from the City of Pittsburgh. Attendees of this webinar will additionally learn: What factors to consider when choosi...
Add Favorite
Top 10 Questions on the Single Audit an...
While the American Rescue Plan Act (ARPA) has been passed into law and relief is already being distributed to states, counties, cities, tribes, and territories, there are still many lingering questions. One of the top questions coming up - "Will my entity be subject to a single audit?" Most likely the answer is “yes". The last thing you want your government organization to experience is audit findings and the risk of owing money to the...
Add Favorite
Zero Trust Security for Agencies
Zero Trust is an evolution of a range of past security architectural approaches and concepts; think network segmentation, least privilege, and defense. The key difference being Zero Trust brings a different mindset to how we design and build security to support the idea of starting with no implicit trust and that we assume a breach has already occurred. The Department of Defense (DOD) released a publication in the Spring of 2021 on Zero Trust...
Add Favorite
Operational Resiliency: The Newest Stra...
The past year has been stressful for government agencies and businesses alike. The COVID-19 pandemic has altered every aspect of government business, from having to quickly enable a remote workforce, to seeing an increase of cyberattacks and breaches, to the greater dependence on third party providers. Any of which on their own can be challenging and severely impact the organization. If nothing else, this period highlighted the fact that exten...
Add Favorite
ExtraHop Demo Desk
Agencies today are working across different platforms and environments, creating a complex web of workloads consisting of hardware, applications, and data spread. Whether it's on edge, core, remote workforce, or cloud deployments, visibility is essentially to ensure security within the organization. Now, as a hybrid, multi-cloud, and containerized environments are standing up, unifying security controls across different environments is critica...
Add Favorite
Detect Cellular, Bluetooth, BLE, Wi-Fi...
Carahsoft and Bastille invite you to join us as we learn how to use a device detection and location kit to find unauthorized devices. The Concern:Are wireless and cellular devices coming into, and possibly passing through, the Visiting Room into other areas a concern for your facility? Bastille's Solution: Bastille detects and locates Cellular, Bluetooth, BLE, Wi-Fi and IoT devices. This provides security teams the ability to accurately locat...
Add Favorite
Back to Search Begin New Search