Eliminate Attack Pivoting with Network...
Consequence boundaries connect networks with dramatically different worst-case consequences of compromise – for example, IT networks connected to base microgrids, building automation or other OT networks. At consequence boundaries, we must eliminate the possibility of online attacks pivoting into our high-consequence networks – an emerging space of network engineering. Join Waterfall Security and Carahsoft to explore how network en...
Boost Your Creative Cloud Workflows wit...
Adobe MAX has concluded and has released powerful new updates across Adobe's entire application suite. Whether you missed the event or want a clear summary of what’s new, this webinar will get you up to speed and inspired for what’s ahead. Join us for our complimentary webinar as we discuss and demonstrate the major updates to Adobe Firefly AI, beta projects, and the Creative Cloud applications going into 2026 and what AI licenses...
Transform How Federal Agencies Operate...
Federal agencies are looking for new ways to modernize operations and improve mission outcomes through digital transformation. The Microsoft OneGov offer provides a streamlined path to achieve these goals by aligning technology investments, resources, and support to help agencies drive efficiency and innovation. Join this complimentary webinar to explore how Microsoft OneGov enables agencies to overcome modernization challenges and accelerate...
Elastic Q3 Quarterly Partner Connect
Join us for the Elastic Public Sector Quarterly Partner Connect on Tuesday, December 16, 2025, at 3:00 PM ET. This 60-minute virtual event, in collaboration with Carahsoft, will bring Elastic partners up to speed with the latest developments and strategic initiatives underpinning your Elastic practice. Gain invaluable updates from Elastic's senior sales and channel executives, including a detailed Partner Summit Preview, insights on delive...
Securing Mission-Critical Workloads at...
This session will explore how Aqua helps agencies secure containerized environments as they move between on-prem and multi-cloud systems. Federal teams are modernizing fast, but traditional security tools miss the misconfigurations, supply chain gaps and runtime exploits that come with these architectures. Aqua will show how agencies can gain visibility, reduce risk and protect workloads without adding friction for operations. Attendees will j...
Quantum in the Federal Government: Mand...
Quantum is no longer a single market; it’s three distinct buying motions inside the U.S. Federal Government. Post-quantum cryptography (PQC) is now a compliance-driven mandate with near-term funding, timelines and agency migration requirements. Quantum computing is a mission-specific investment area led by DOE, national labs and select defense organizations that are prioritizing applied research, simulation and early workload prototyping...
Whats New in Adobe Learning Manager: Ro...
Organizations are under growing pressure to deliver training programs that are accurate, personalized, and aligned to fast-changing workforce needs. As learning ecosystems expand, administrators need better reporting, cleaner integrations, and more flexibility to create experiences that scale across roles and teams. The latest Adobe Learning Manager updates make this easier by giving you more control, more visibility, and a more intuitive expe...
DNS: The Blind Spot in Federal Cybersecurity
"Traffic for DNS lookups often goes largely unmonitored by many security tools. Whereas web and email traffic are often closely scrutinized, DNS traffic largely represents a blind spot for such defenses." Sound familiar? In today’s evolving threat landscape, adversaries are exploiting this overlooked protocol to infiltrate federal networks, embedding malware in DNS TXT records and bypassing traditional defenses. Even sophisticated agenci...
AI at Work: Modernizing Compliance, Fra...
Join us on December 17th for a half-day event exploring how Artificial Intelligence is transforming federal operations in audit, compliance, fraud detection and cybersecurity. From intelligent automation to agentic systems that learn and adapt, AI is reshaping government workflows at every level. This program offers a chance to learn from experts and peers who are leading modernization and security efforts across federal agencies. You’ll...
ThreatOps Challenge: Cloud Workshop
The ThreatOps Challenge is a capture the flag style webinar that will pit your skills against other Public Sector professionals! Join us for training on SentinelOne Cloud Native Security (CNS), then test your skills at finding exploits before attackers strike and hunting for bad actors and leaked credentials. During this webinar, attendees will learn:How to analyze network traffic and use CNS featuresHow to uncover vulnerabilitiesHow SentinelO...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.