Back to Search Begin New Search Save Search Auto-Notify
Take home the GOLD with Veeam Data Protection
Join us June 13th for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who will show Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, will simultaneously guide you through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
June 13, 2024
Organizer: Veeam Software Corp. Government Team at Carahsoft
Location: Webcast
Add Favorite
Empowering IT with NinjaOne
IT leaders in the Public Sector face unique challenges in supporting their endpoints and end-users. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabilities. In a...
June 13, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Wings of Innovation: Transitioning to C...
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure. In the rapidly evolving realm of cloud technology, Aviata finds itself at a pivotal moment, ready to embark on a journey of transformation. With the pressing need to modernize their architecture looming large, the company sets its sig...
June 13, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Using AI to Prevent Data Loss and Email...
A comprehensive approach to stopping sensitive data loss combines a traditional rules-based approach with behavioral AI. Organizations face substantial security risks from misdirected emails and data exfiltration, leading to increased labor costs for investigations, regulatory reporting, and compliance communications. As a key conduit for sensitive data, email can expose businesses to regulatory fines, reputational damage, and customer loss. T...
June 13, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Cut Through the Complexity of Balancing...
Enterprise operating structures increasingly face challenges from turbulent and uncertain business scenarios. Enterprises often respond with some degree of centralizing, decentralizing or federating their approaches to how decisions are made and accountabilities distributed to become more responsive, capture opportunities or pivot their strategies. Centralized decision making maximizes synergies among business units through better and more eff...
June 13, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
Fortress in the Cloud: Building Zero Trust
In today's increasingly complex cloud landscape, securing your environment requires a fundamental shift from traditional castle-and- moat defenses to a zero trust approach. This webinar, co-hosted by Palo Alto Networks and AWS, will guide you through the essential concepts of zero trust security and explore how Palo Alto Networks and AWS can empower you to achieve it. During this webinar, attendees will: Understand the core principles of zero...
June 13, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
HashiCorp Boundary & Vault AWS Immersio...
HashiCorp Boundary is a secure remote access solution that provides an easy way to securely access critical systems with fine-grained authorizations based on trusted identities. With Boundary Enterprise, your organization can rest assured that managing remote access of your users will be secured from this self-managed deployment of Boundary. Bundled into Boundary Enterprise is Boundary Session Recording, which allows organizations to track wha...
June 17, 2024
Organizer: HashiCorp | Amazon Web Services (AWS)
Location: Webcast
Add Favorite
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
June 17, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
June 18, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Steering Through Complexity: Grasping C...
Join Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRIM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. Delve into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 2.A and the OMB Memo-CISA Attestation Form....
June 18, 2024
Organizer: Interos Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search