Back to Search Begin New Search Save Search Auto-Notify
Introduction to Cryptocurrency Concepts
What Government Agencies, Regulators, and Investigators Need to Know As government agencies, regulators, and investigators look to more accurately assess the risks associated with the nascent industry of cryptocurrency, it is important to identify key players within the ecosystem. This complimentary webinar will cover the various typologies across the cryptocurrency space including gambling sites, hosted wallets, mining pools, high-risk exchan...
Add Favorite
Red Hat and Anchore Discuss DevSecOps i...
The United States Department of Defense (DoD) is taking a new approach to building, deploying and operating software. To maintain their competitive edge, they are integrating DevSecOps practices into each stage of the software development process. Join Anchore, Red Hat and Carahsoft to hear from Anchore's Craig Bowman and Red Hat's Michael Epley, to discuss their contributions to the DoD DevSecOps Platform (DSOP) including: Understand the impo...
Add Favorite
Seton Hall University Modernizes Identi...
Seton Hall University Modernizes Identity with Okta At Okta, they focus on two main themes which are to protect campuses from security threats while making the user's experience simple and enjoyable. Higher education has taken great steps forward to automate identity management, but most colleges and universities are just starting their path to a true frictionless experience by eliminating passwords and incorporating device trust into their ac...
Add Favorite
Increase Efficiency and Propel Savings...
State and Local governments are continuing to be called upon to run efficiently, effectively, and make better business decisions in these challenging times. Join us as we demonstrate how Salesforce Maps allows agencies to make the most of their Salesforce investment by using location intelligence to drive savings and productivity by 30%+ across not only normal state operations, but also during the COVID-19 crisis. We will walk you through the...
Add Favorite
Virtual GPUs Powering the Remote Workforce
With NVIDIA GPU virtualization solutions and VMware Horizon, government agencies can deliver powerful virtual workstations with high-quality user experience so their workforce can securely work from anywhere, on any connected device. Join us to learn how to quickly enable your remote workforce with NVIDIA and VMware solutions on-premises or from the cloud, and give a performance boost to users relying on VDI with solutions that are scalable an...
Add Favorite
Zero Trust Security for the Digital Workspace
Security is an ongoing challenge for organizations and with today’s dynamic workforce, the challenge is ever-increasing. Rapidly changing work styles and increased use of SaaS applications have resulted in the End-User Computing Zero Trust model becoming one of the most important forms of alternative security, an architectural mindset aimed at securing and protecting your data. VMware Workspace ONE combines Zero Trust conditional access...
Add Favorite
Collective Defense and the Global Cyber...
Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.Combined with the current work environment and the emergence of new threat vectors from key adversaries, we are entering a more dangerous cyber threat landscape than ever...
Add Favorite
Seeing the Cybersecurity Battlefield: A...
Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. While the tools being used are valuable and have costly limitations, operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the securit...
Add Favorite
The Power of Voice to Prevent Fraud
Nuance security and biometrics solutions enable easy and secure authentication by identifying a person based on their human traits; like their voice, fingerprints, face or even how they use their devices. The importance of security cannot be understated. Today's businesses rely on working with known customers in a friction-free environment. To get to that level of customer service, organizations need to be confident that their customer is who...
Add Favorite
Blockchain & Distributed Ledger: Not Ju...
Expanding the Federal Blockchain Use Case to Securing Communications When you think of blockchain, the first things that come to mind are Bitcoin and other cryptocurrencies. In the federal government, blockchain technology is leveraged for missions that rely on the free flow of accurate, "need-to-know" information and communications that are less than secure. The native security capabilities of blockchain dramatically improve the abilities of...
Add Favorite
Back to Search Begin New Search