Back to Search Begin New Search Save Search Auto-Notify
Investigation & Threat Hunting Virtual...
The surge in advanced attackers has created a need for SecOps to understand, quickly respond to and hunt the most sophisticated threats inside your organization. Join this 3 hour hands-on investigation and threat hunting virtual workshop to boost your skills and learn how to use Cortex XDR to stop sophisticated attacks by: Creating custom rules to alert on suspicious behavior Accelerating threat hunting with enriched, contextualized data Quick...
June 30, 2020
Organizer: Palo Alto Networks
Location: Virtual
Add Favorite
UK/EU Export Controls and Sanctions 101
Covering the basics and awareness on export controls and sanctions US companies need for operations in the UK or EU! All companies with operations in the UK and/or the European Union particularly – not just those dealing in defense or dual-use items – need to be aware of the export controls and sanctions regulations that may apply. Those regulations, while similar to their US equivalents, also have significant differences. Business...
June 30, 2020
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
A Deep Dive Into Cloud Computing
The last decade has seen a remarkable shift in the way governments operate. 2010’s Cloud First mandate created a surge in cloud migrations, and while there are plenty of benefits to this migration, it has created complex cloud environments to manage and monitor at scale. Agencies need innovative risk management solutions, automation, and cloud performance monitoring tools to get the most out of the cloud environment in real-time and all...
June 30, 2020
Organizer: GovLoop
Location: Virtual
Add Favorite
Unified Endpoint Security: Bringing Ord...
Join BlackBerry and Carahsoft for a briefing on how the number of devices, users, applications, and services touching workplace resources is increasing exponentially while attackers only need one vulnerability for success. Allowing employees to access sensitive data with tablets, phones, or other mobile devices also offers attackers new avenues for breaching security. The outcome of the traditional approach to cybersecurity is obvious; motivat...
June 30, 2020
Organizer: BlackBerry Government Team at Carahsoft
Location: Webcast
Add Favorite
AI in Action: Enhancing Access and Effi...
Artificial intelligence might feel like something from the future, but many federal civilian and defense agencies have already integrated this technology into their plans for mission delivery. Leveraging AI in government operations promises to increase speed, efficiency and analytical power; it even has the capability to strengthen the security of data and critical infrastructure. As government agencies implement new technologies, they must do...
June 30, 2020
Organizer: Government Executive Media Group
Location: Webcast
Add Favorite
Building an Incident Response Approach...
Downtime is inevitable. New applications, shifting application usage trends, and remote work not only increase downtime frequency, but the length of downtime. While downtime may be inevitable, you and your team can choose how to respond. An incident response plan bolstered by an on-call system can help your team direct problems to the right people faster, recover from downtime more effectively, and reduce on-call burnout and "alert fatigue." T...
June 30, 2020
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Cybersmart 2020: Fortifying the Future...
Governments must keep up with the increasingly urgent need to protect digital information and infrastructure. As telework work becomes the new normal for the foreseeable future: How can organizations ensure that the services their employees rely on are secure? How can they mitigate vulnerabilities and protect against foreign cyber actors while still advancing mission delivery? How can employees avoid burnout as they work to make sure their gov...
June 30, 2020
Organizer: Government Technology
Location: Webcast
Add Favorite
Enterprise Infrastructure Solutions-DPA
This course provides Federal Agency Ordering Contracting Officers (OCOs) or other officials who have authority to issue Task Orders, the prerequisite needed to request an Enterprise Infrastructure Solutions (EIS), Delegation of Procurement Authority (DPA) allowing them to use the EIS Multiple Award, IDIQ contracts to issue task orders. This course will provide an overview of the EIS contracts, describe the requirements of FAR 16.505 and its ap...
June 30, 2020
Organizer: General Services Administration
Location: Webcast
Add Favorite
GSA INDOPACOM AOR Virtual Training Seri...
MAS Consolidation is one of the four Cornerstone Initiatives of GSA’s Federal Marketplace (FMP) strategy, GSA’s plan to modernize and simplify the buying and selling experience for customers, suppliers, and acquisition professionals. GSA’s new single Schedule solicitation features a simplified format with streamlined terms and conditions, new large categories and sub-categories, and updated Special Item Numbers (SINs) that wi...
June 30, 2020
Organizer: General Services Administration
Location: Webcast
Add Favorite
IP Webinars for SBIR/STTR Awardees
For small businesses participating in the federal government’s Small Business Innovation Research (SBIR) or Small Business Technology Transfer (STTR) programs, understanding intellectual property (IP)—including patents, trade secrets, trademarks, and copyrights—is necessary to protect your ideas, products, and product names in today’s knowledge economy. This series of seven 90-minute webinars, organized by the USPTO and...
June 30, 2020
Organizer: USPTO
Location: Webcast
Add Favorite
Back to Search Begin New Search