Back to Search Begin New Search Save Search Auto-Notify
Take home the GOLD with Veeam Data Protection
Join us June 13th for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who will show Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, will simultaneously guide you through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
June 13, 2024
Organizer: Veeam Software Corp. Government Team at Carahsoft
Location: Webcast
Add Favorite
Empowering IT with NinjaOne
IT leaders in the Public Sector face unique challenges in supporting their endpoints and end-users. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabilities. In a...
June 13, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Wings of Innovation: Transitioning to C...
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure. In the rapidly evolving realm of cloud technology, Aviata finds itself at a pivotal moment, ready to embark on a journey of transformation. With the pressing need to modernize their architecture looming large, the company sets its sig...
June 13, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Stopping Email Blunders Before They Happen
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI. Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance communications. As a key conduit for sensitive data, email can expose businesses to regulatory fines, reputational damage, and customer loss. T...
June 13, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Cut Through the Complexity of Balancing...
Enterprise operating structures increasingly face challenges from turbulent and uncertain business scenarios. Enterprises often respond with some degree of centralizing, decentralizing or federating their approaches to how decisions are made and accountabilities distributed to become more responsive, capture opportunities or pivot their strategies. Centralized decision making maximizes synergies among business units through better and more eff...
June 13, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
HashiCorp Boundary & Vault AWS Immersio...
HashiCorp Boundary is a secure remote access solution that provides an easy way to securely access critical systems with fine-grained authorizations based on trusted identities. With Boundary Enterprise, your organization can rest assured that managing remote access of your users will be secured from this self-managed deployment of Boundary. Bundled into Boundary Enterprise is Boundary Session Recording, which allows organizations to track wha...
June 17, 2024
Organizer: HashiCorp | Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
June 17, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
June 18, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
CrowdStrike Product Training Mini-Serie...
Cloud security is one of the most important topics for customers this year. More and more customers are looking for solutions, that can protect all cloud workloads and provide full visibility and transparency into their actual cloud configuration. Participants of this webinar will get a deep technical understanding on: How CrowdStrike protects all those Cloud Workload with CWP (Cloud Workload Protection) How CrowdStrike shows up a fully visibi...
June 20, 2024
Organizer: TD Synnex | CrowdStrike
Location: Webcast
Add Favorite
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. Join CyberArk and UberEther on June 20th to explore the transformative journey from traditional, on-premises...
June 20, 2024
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search