Back to Search Begin New Search Save Search Auto-Notify
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
Outplaying Cybercriminals: Modern Ranso...
In this on-demand webinar, Jeff Adams, National Director, Cloud Sales Public Sector, VMware, and Matt McGarth, Global AWS Sales Synergy Leader, VMware, led an informative discussion on Modern Ransomware Recovery Strategies. Download this webinar now and learn how VMware and Amazon Web Services GovCloud are jointly engineered secure, on-demand cloud service that brings VMware’s rich Software-Defined Data Center software to the AWS GovClou...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
CX Reimagined: How SMS Fosters Citizen...
Digitizing government services provides a unique opportunity to engage and serve the public. Prioritizing multi-channel outreach strategies has helped agencies to better engage with their vast audiences and underserved communities. Building an inclusive, transparent government starts with strategic communications that reach people where they are most. Governments benefit from creating thoughtful interactions that provide updates to enhance the...
Add Favorite
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
Add Favorite
Protect Your Government Agency's Data a...
Modernizing applications and migrating to public cloud platforms enhance agility and flexibility. But there are also trade-offs to consider, including new and borderless attack surfaces, lack of consistent visibility, and growing tool sprawl and tool expenses. Together, Gigamon and Sumo Logic enable organizations to build an effective and efficient monitoring and security posture that surfaces a level of understanding unattainable beforehand....
Add Favorite
Build and Grow a GIS Program for Operat...
Where do you start when building a GIS program from scratch? Guadalupe-Blanco River Authority (GBRA), which provides stewardship for water resources in its ten-county district in south central Texas, invested in Esri ArcGIS Enterprise and field data collection applications at the start of their journey and added Nearmap to their tool set. Based on previous experience, GIS Administrator Mysti Downing knew Nearmap high-resolution imagery could p...
Add Favorite
Transforming Authentication: From Execu...
The Executive Order M-22-09 mandates that all government agencies and contractors doing business with the government must implement phishing-resistant MFA for employees, contractors and citizens online applications by fiscal year end 2024. NIST, CISA, and NSA have recommended a FIDO-based approach as the best option. Together UberEther and Nok Nok provide the platform and expertise to address the executive order, and make it easy for you to ac...
Add Favorite
Carahsoft IACP Webinar 2023 Emerging Te...
Zebra and Carahsoft are excited to invite you to join us subsequent to IACP 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Advancements in technologies have enabled police agencies to find innovative ways to leverage new technologies to increase effectiveness and improve officer safety. With the right pairing of mobility and data communication technologies...
Add Favorite
Back to Search Begin New Search