Standardize and Automate Security Compl...
As government agencies increasingly embrace cloud, containers and DevSecOps practices, they are looking for more efficient and effective tools to support software delivery efforts. Join GitLab, HashiCorp and WWT for an information-packed webinar discussing a revolutionary approach to managing the implementation of security compliance controls in risk averse environments to enable predictability, repeatability and reliability in your agency's d...
St. Patty's Day Security "Shake Up" wit...
The current threat landscape has accelerated the need for agencies and organizations to update and secure critical infrastructure. As remote and hybrid workforces expand, there is little question that Privileged Identity Management (PIM) will play an increasingly crucial role in mitigating cyber-attacks. Keeping pace with evolving threats such as Ransomware, Malware, and Data Breaches can be stressful. BeyondTrust and SailPoint invite you to t...
New Year, New Threats: Mandiant Retaine...
Are you fully prepared for a cyber incident?An incident response retainer could make all the difference!Don't wait until it's too late. Incident response retainers help you respond to and contain incidents quickly. Join FireEye and Carahsoft for a complimentary webinar featuring Lyle Sudin from our Mandiant Team, a veteran of Incident Response, to discuss:What exactly is an Incident Response Retainer (IRR)How does an IRR work?Who needs an IRR?...
Gigamon Demo Desk: Optimizing Cloud Migration
Organizations are embracing cloud and virtualization to drive innovation and enhance agility. As more workloads move to these environments, you open yourself up to new risks. Too many cloud migrations and cloud-native projects take longer and cost more than expected. Join us to learn about how Gigamon can: Extend your security posture and compliance to cloud uploads Get visibility to all cloud and virtualization traffic in order to accelerate...
March Madness 2021: Networking and Appl...
Join us for a series of three March Madness events where you will get to hear about simple IT, networking and application visibility, and securing your HCI (hyperconverged infrastructure) environment. This will be a short panel discussion followed by March Madness entertainment where we will have special guests join us to talk about what to expect this year, deep dive on how to choose your winning bracket, and a recap and discussion about som...
Introduction to the Splunk Machine Lear...
Join the DOE Splunk account teams as we provide an introduction to the Splunk Machine Learning Toolkit 5.2.1. (MLTK) as well as customer-created use-cases leveraging the awesome power of the Splunk Platform. Within this session, we will cover new enhancements within Splunk MLTK 5 as well as an overview of how customers are implementing the power of machine learning to build useful models and ML-powered workflows to address operational and cybe...
Enabling Better Research and Analytics...
Research and collaboration are core tenets of most higher education institutions, academic medical centers, and many healthcare providers. Sharing and collaborating around the right clinical insights and research data, securely, across today's complex healthcare and academic data environments requires Data Intelligence that leverages automation, AI, and ML technologies as well as workflow to engage subject matter experts. Join us for this web...
Protecting the Federal Workforce with S...
As our nation combats the pandemic and strives for economic recovery, government services and mission areas have never been more critical. Government agencies must protect the Federal workforce that accomplishes these essential services by providing a safe and effective work environment. Whether a Federal worker is teleworking, on-site in a Federal building, or a bit of both, they need the tools to work efficiently and within a safe work envir...
Infoblox Demo Desk
Interested in learning more about Infoblox? Join our Infoblox-Certified Demo Jock for a 30-minute demo to learn how Infoblox can provide a smarter and more efficient way to manage and protect your network from the impacts on security that are arising due to evolving IT architectures. You will learn how to leverage the foundational infrastructure you already rely on everyday - DNS, DHCP, and IPAM. Our presenter will also discuss how Infoblox us...
Meet the CDM Requirements for App Contr...
The Continuous Diagnostics and Mitigation (CDM) Program provides a dynamic approach to strengthening the cybersecurity of government networks and systems. The CDM Program was originally a phased development of requirements based on the security control groupings below: Phase 1 - What is on the network? Phase 2 - Who is on the network? Phase 3 - What is happening on the network? Phase 4 - Protecting the data on the network Join VMware and Carah...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.