Leveraging Odaseva for Comprehensive Da...
Join us for an insightful webinar where we delve into the success story of Dallas County Health & Human Services' journey leveraging Odaseva Backup & Restore to secure and manage their critical data. In this webinar, you'll gain firsthand insights into: The challenges faced by DCHHS and their specific data management needs How Accenture recommended Odaseva as the optimal solution to address these challenges Key benefits realize...
FortiGate and SD-WAN
We invite you to join Fortinet and Carahsoft for our complimentary demo desk: FortiGate and SD-WAN. Discover the power of FortiOS and how it is leveraged to create secure and efficient network architecture. Firewalls, the backbone of any network’s cybersecurity architecture, need to level-up in order to support the demands of the modern world. Especially as SD-WAN (Software-Defined Wide Area Networks) becomes more prevalent across the na...
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, despite their ubiquity, wireless devices are still susceptible to insider threats. And with the September 30, 2024 deadline to implement Wireless Intrusion Detections for SCIFs and SAPFs quickly approaching, now is the time to learn how to reduce your risk. Insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed li...
How to Secure Your Agency’s Microsoft 3...
Are you working overtime trying to govern and secure your agency’s M365 environment? With 2000+ tenant configurations and 18+ admin interfaces, getting policy correct in M365 is an overwhelming task, leaving resource-constrained agencies exposed. What if you could get unified control of your M365 environment, prevent dangerous misconfigurations, find & fix critical collaboration and identity risks, and minimize privilege exposure wit...
Tidelift is Hosting Upstream: A One Day...
Upstream 2024, hosted by Tidelift, is set to tackle the persistent challenges of improving the health and security of open source software through a virtual symposium focused on pioneering technologies and unconventional solutions. Tune in on June 5 to take part in innovative discourse, connecting thought leaders, open source maintainers and visionaries from diverse fields. By attending this virtual event, you can expect to: Learn emerging and...
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer:
FedInsider Location:
Webcast
SANS Miami 2024: Keynote - UP YOUR Secu...
Tim Medin discusses the dumbest red team tricks and hacks encountered over the years. We are going to take the A out of APT, because so few attackers really need to use advanced techniques. Developing your career in security doesn’t have to be painful. There is a lot of opportunity to find new an interesting things, even if you are junior or new to the field.
Building FARM Stack Apps: FastAPI, Reac...
A high-performance, rapid development, Python-based development stack for rich web applications — that’s the FARM stack. Comprising FastAPI, React, and MongoDB, the FARM stack provides a development environment that shortens time to production for today’s modern web apps. The webinar guides you through the entire development process, including: Setting up the development environment with Docker Compose Configuring the databas...
June 5, 2024
Organizer:
MongoDB Location:
Webcast
Consolidation with CrowdStrike
Evolving cyber threats are making an enterprise-wide impact on organizations, forcing business leaders to make complex decisions about the future of their security program and overall strategy. Many organizations have adopted countless security tools, resulting in a disconnected, disjointed security stack that causes operational distress, burns a hole in their pocket and even puts them at further risk because adversaries thrive in complexity....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.