Back to Search Begin New Search Save Search Auto-Notify
Take to the Seas and Stay Afloat with K...
Join us on March 14 for an interactive LEGO experience with TWO live demos! Matt Slotten, Veeam’s Principal Solutions Architect, will walk you through how easy it is to protect and recover our cloud native applications from accidental deletion or ransomware attack using Kasten by Veeam. Adam Ward, a LEGO extraordinaire, will simultaneously guide you through the assembly of a nautically themed LEGO model to keep your Cloud Native Containe...
March 14, 2024
Organizer: Veeam Software Corp. Government Team at Carahsoft
Location: Webcast
Add Favorite
Ransomware Detection and Response Virtu...
Become a black belt in ransomware detection and response and get a blueprint to build your organization’s cyber resilience at a Trellix virtual workshop.Cyber experts will help you identify gaps in your current architecture and put together an action plan that helps you take back control and defend against ransomware. Join experts and your peers for an interactive workshop. Map out a plan of action in your personal workbook Take part in...
March 5, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Unveiling Top Cloud Exploits and Cyber...
For more than 10 years, agencies have been shifting their digital footprint to cloud computing. The ability to rapidly scale solutions in a cost-effective manner allows any agency to enhance its agility, improve application release timelines, and leverage additional computing resources on demand. While this has changed how agencies manage their IT assets, the need for security remains just as strong. Throughout 2023, the Threat Research Unit...
February 27, 2024
Organizer: Qualys Government Team at Carahsoft
Location: Webcast
Add Favorite
Keeping Students Safe Online: How to Ma...
K-12 schools are lucrative targets for cyberattacks because they house vast amounts of valuable student data. For these schools to implement a comprehensive cybersecurity strategy – one that enables leading-edge detection and response – their leaders must generate maximum value out of their cybersecurity investments. That means deploying tools and services with a dual purpose or multiple advantages, emphasizing stretching cybersecu...
January 31, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Secure Schools, Bright Futures: Cyberse...
K-12 institutions are focused on providing continuous, safe, and secure learning environments for students and staff. Despite being resource constrained, school districts must adhere to fundamental cybersecurity practices such as FERPA compliance and ransomware prevention. Join us to learn about the top cybersecurity best practices for K-12 school districts and how Palo Alto Networks approaches these in order to safeguard people and data. In...
January 31, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Future-Proofing the Public Sector: Wind...
The phasing out of Windows 10 is a significant transition period for many public sector IT teams. This move coincides with another vital IT transformation moment – the proliferation of generative AI. And, as always, IT leaders have to navigate the evolved cyber threats resulting from these new and exciting cyber abilities. More than ever, staying up to speed with technology means making the right IT investments. Join Government Technolog...
January 30, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
January 26, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
2024 Predictions Report: Evolution Is t...
The term ‘evolution’ implies the gradual growth of something from simple to complex, and it perfectly sums up Arctic Wolf’s 2024 Cyber Threat Predictions. The predictions presented are based on current cybersecurity trends and insights gathered from our data, and trace the development of several trends based on their earlier, simpler iterations and anticipate which ones are poised to take significant steps forward in the year...
January 16, 2024
Organizer: FutureCon
Location: Webcast
Add Favorite
Understanding FedRAMP Compliance Webinar
Are you familiar with Federal Government programs for protecting controlled unclassified information? There is an increasing emphasis on enforcing the protection of sensitive data by government contractors through cybersecurity compliance programs that require implementation of the Federal Risk and Authorization Management Program (FedRAMP).Companies doing business directly or indirectly with the Department of Defense (DoD) must be aware of th...
November 9, 2023
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
Partnerships in Cybersecurity Education...
Cybersecurity education and workforce development is a significant issue given large current national capability and skills gaps. In this webinar, we bring together key partners and major stakeholders from the public sector, private sector, and academia to discuss pathways of collaboration and partnerships moving forward to solving this important problem. Panel members will discuss their experience and “best practices” to reduce th...
November 7, 2023
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search