Back to Search Begin New Search Save Search Auto-Notify
Enabling Cloud Confidence
The biggest barrier to successful cloud adoption is often trust. Trust that a team won't cause a runaway cloud bill or run afoul of a compliance standard. Trust that an IT organization can deliver the support necessary to help a team get things done in the cloud. IT organizations in higher ED and state governments are similar when it comes to tackling cloud challenges: both have common roles and mandates around serving citizens and students co...
Add Favorite
Best Practices for Implementing Zero Tr...
As governments and educational institutions strive to meet public demands for access to data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to adopt a modern security approach like Zero Trust. During this webinar, you will hear from industry expert David Cagical, former CIO for the State of Wisconsin, and Matt Singleton,...
Add Favorite
Accelerating Your Zero Trust Architectu...
Join us for an exclusive Splunk webinar where we will provide an overview of the Zero Trust Framework and how you can leverage Splunk as a key component to your Zero Trust Architecture. Our experts will showcase the features, benefits, and capabilities of Splunk that will help you improve your organization’s security posture and accelerate your Zero Trust Architecture. During this webinar, attendees will: Gain a comprehensive understandi...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
Department of Energy - Okta: Identity P...
Almost every organization has experienced a serious security breach or has felt the effects of a breach on another organization. To prevent breaches, Department of Energy labs often employ a variety of point solutions, but these aren’t comprehensive or simple to manage solutions. An identity based security strategy is the key to developing a Zero Trust Architecture (ZTA) that can help address DOE lab's security challenges. Join Okta in t...
Add Favorite
How a U.S. County Solves Business Probl...
States, cities and counties across the United States trust Elastic, the industry leader in security, observability and search use cases, to solve their mission-critical problems with data-based insights.Elastic and Collin County took the virtual stage for a conversation exploring a real-world success story involving a single security use case that quickly expanded to other IT departments and personas. During the event, our featured speakers co...
Add Favorite
Closing Public Sector Security Gaps: An...
Join Carahsoft, GuidePoint and Invicti for a webinar on closing public sector security gaps. Spend an hour with Invicti learning about how to best protect your web applications and APIs with dynamic application security (DAST). Mark Townsend, Invicti’s VP of Professional Services and Jean-Paul Bergeaux, GuidePoint’s Federal CTO, will be talking about an outside-in approach to application and API security testing and: Common challen...
Add Favorite
The Future of Document Intelligence in...
Today, public sector agencies are faced with more physical and digital documents than ever before, and gaining access to information within them is a time-consuming and labor-intensive process that hinders efficiency and productivity. Government organizations are implementing technologies like digitization, automation, artificial intelligence (AI), and cloud-based systems to improve information access and data security, streamline processes, a...
Add Favorite
Mobile Security Posture at the Departme...
Developing mobile applications is difficult and fraught with challenges. The solution? Finding the best app security testing abilities to help ensure mobile app development efforts are in line with Federal requirements and standards. NowSecure analyzes and continuously monitors mobile apps for security, privacy and compliance issues, scoring the risk with actionable information to help agencies protect themselves from mobile risks in their mob...
Add Favorite
Secure Development in U.S. Government A...
You're invited to join Security Compass and Carahsoft for a webinar that will assist in reshaping the landscape of secure development within U.S. Government Agencies. Government agencies have acknowledged the pressing need to bolster their security posture, with 90% embracing a "shift left" mindset. Despite advancements in seure code practices and automation, outdated methods like spreadsheets still persist. During this webinar,...
Add Favorite
Back to Search Begin New Search