388 past events found
Back to Search Begin New Search Save Search Auto-Notify
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
Federal Podcast Series with AWS and Car...
Welcome to our Federal Podcast Series with AWS and Carahsoft! Our weekly podcast sessions will focus on various solutions, relating to federal customers, that your organization might be interested in. Episode 7: Archiving, Purging and Strategic Back-up of Data with RV Global Solutions This episode with Rahul Gangu and Venkat Chivukula from RV Global Solutions, discuss how to leverage the AWS cloud for the highest ROI when archiving, purging an...
Add Favorite
Adobe Sign Webinar Series: Transform Pa...
In today’s remote world, Adobe supports government agencies in delivering the best possible document signing experiences by replacing physical signatures with electronic signatures (e-signatures). As the public sector advances to 100% paperless processes, in efforts to meet digital transformation initiatives, Adobe Sign is empowering users to deliver fast, legal, and secure services while cutting costs associated with manual, paper-based...
Add Favorite
The Simplest Way to Securely Segregate...
As process and data consolidation increases in every organization, securing and segregating data becomes critical. Join Yansa Labs and Carahsoft for this on-demand webinar where we show you the simplest, most efficient, and most maintainable way to keep your data in front of the appropriate audience. Improve the effectiveness of your ServiceNow developers, decrease your testing and maintenance burden, and increase the confidence and compliance...
Add Favorite
Hacks, Threats & Ransoms - What's Next?...
Reduce the risk of security breaches by understanding and protecting what matters most: your critical data. Establishing metadata-driven intelligence and automation to operationalize data protection management helps you discover, classify, analyze, protect, and monitor sensitive data across your organization. Whether your sensitive data is structured, semi-structured or unstructured data in the cloud, on premises, in big data stores, or in rel...
Add Favorite
Cybersecurity, Ransomware, and the Clou...
Sharing data in the cloud offers a huge advantage for educators to easily offer faculty and students the ability to work and study wherever they are. It also helps the IT Operations team to simplify management and costs for infrastructure, data storage, and data protection. But you may have questions as you determine your cloud strategy. How secure is the cloud? Is all your data automatically protected in the cloud? What happens when ransomwar...
Add Favorite
AvePoint Webinar: Modernizing Governmen...
Government agencies have significantly accelerated their digital transformations in the wake of the pandemic. With AvePoint's portfolio of SaaS solutions recently receiving FedRAMP Authorization, they can continue to accelerate this transformation while ensuring their collaboration is compliant and secure. This includes an automated workspace management system to increase security and data protection across all Microsoft 365 workspaces that wi...
Add Favorite
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
How to Catch Advanced Persistent Threat...
Join Dr. Richard T. White and Robert D. Long of Tennessee Department of Transportation's Cyber Security Team on how they secure of the Top 5 highway systems in the U.S. against advanced persistent threats (APTs) and ransomware attacks. Richard and Robert will be interviewed by Val Bercovici, CEO and co-founder of Chainkit about the their new architecture and highlights published in their new technical paper: Secure Connectivity for Intelligent...
Add Favorite
FAR Part 42- Contract Administration An...
This part prescribes policies and procedures for assigning and performing contract administration and contract audit services.
Add Favorite
Back to Search Begin New Search