Back to Search Begin New Search Save Search Auto-Notify
AI and State-Sponsored Espionage - A We...
Join Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats. AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern. Recent trends indicate that cyber espionage is on the rise, and the employment of AI by th...
June 20, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Register now to hear how Synopsys can help you navigate the requirements of EO 2024-011 and secure your critical applications. Join Synopsys on Jun...
June 20, 2024
Organizer: Synopsys Government Team at Carahsoft
Location: Webcast
Add Favorite
Combatting Emerging Threats: Proofpoint...
Proofpoint, BluVector and Carahsoft are excited to invite you to join us in the lead up to TechNet 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector wi...
June 20, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
The Key IT Org Design Principles for En...
Organizational structures can create silos and barriers that hinder collaboration and communication, leading to delays and inefficiency. To accelerate digital delivery, chief information officers (CIOs) should promote cross-functional efforts by designing structures that support product-team-focused business goals and outcomes. As CIOs evolve IT to a product-delivery-centric operating model, they often have questions like: Which organizational...
June 20, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Approach Cybersecurity as a Business In...
Cost and value are the levers driving all business outcomes with the exception of cybersecurity, until now. Executive boards want cybersecurity managed like other business risks. Measuring cybersecurity value delivery and establishing a standard of care accrues benefits, shifting the landscape in cybersecurity investment. Security and risk leaders must be able to communicate the risks, value and cost of cybersecurity to their board of director...
June 20, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Unleashing Agility, Modernizing Governm...
Forward-thinking leaders across the public sector are spearheading an Agile transformation by implementing modern solutions to boost time-to-market, optimize team productivity, and navigate time and budget constraints. Defense agencies are shifting away from traditional procurement processes and are developing Agile, mission-driven workflows as the foundation of their dynamic modernization strategies. By adopting this cutting-edge approach to...
June 20, 2024
Organizer: GovExec
Location: Webcast
Add Favorite
Shielding Helpdesk Operations Against S...
The Scattered Spider attack on MGM represented a significant breach in cybersecurity measures, disrupting the company’s services and jeopardizing customer data, all from a call into the helpdesk. The breach illustrated an identity gap in identity and access management, highlighting the significance of Caller ID Verification in fortifying helpdesk security protocols. This attack has shown the impact of an inability to ensure the identity...
June 20, 2024
Organizer: 1Kosmos Government Team at Carahsoft
Location: Webcast
Add Favorite
Increase IT Efficiency and Protection w...
Today’s flexible work environments make it increasingly challenging for IT leaders to manage organization-wide defenses. With Microsoft Intune, IT teams can enhance security across various computing environments, simplifying the process of safeguarding company data and improving efficiency for both users and IT professionals. In this digital event, Microsoft experts will walk you through a demo of how Microsoft Intune works and answer q...
June 20, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
No Room for Doubt: Mastering the Cyber...
Unexpected downtime from a cyberattack can be costly for your customers. From lost productivity, reputation or data, having critical systems go down can cause serious damage, especially if there is not a recovery plan in place. Your customers need security and confidence in the recovery, leaving no room for doubt that their systems have clear plans in place to mitigate risk and impacts of cyberattacks.Join Veritas and Carahsoft for an extensiv...
June 20, 2024
Organizer: Veritas Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search