37 past events found
Back to Search Begin New Search Save Search Auto-Notify
Protecting Your Digital Content
There’s no doubt that everywhere we go in the world today we are fully entrenched in the digital age. The federal government is feeling the effects of this change and working to keep pace. Digital-first mandates from the government are driving the public sector’s move away from paper documents and toward electronic ones. However, one major challenge of this digital transformation is keeping digital content, especially sensitive inf...
October 27, 2016
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Operationalize Cyber Intelligence in Re...
View our on-demand webcast to learn how you can perform real-time security analytics and threat hunting enabled by the performance and speed of the leading in-memory data management and analysis platform, SAP HANA, and the leading Threat Intelligence platform, ThreatConnect. We will discuss how you can unite people and processes while simplifying data and technologies in your network environment. By the conclusion of this webcast, you will und...
September 15, 2016
Organizer: SAP NS2 Government Team at Carahsoft
Location: Webcast
Add Favorite
Surviving a Modern Cyber Attack with Is...
Join us for an exclusive webcast during which we'll share intelligence and lessons learned from these attacks. In addition, you'll discover:Threat and risk - what's different about the latest ransomware and extortionware cases and how IT teams are approaching the problemVisibility and detection - what IT teams can do to protect their environmentsRemediation and recovery - best practices and lessons learned on how to recover from an attackCyber...
September 7, 2016
Organizer: EMC & Carahsoft
Location: Webcast
Add Favorite
Intelligent Threat Detection in Government
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
August 30, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Can You Benefit From the NIST Cybersecu...
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) has been active since February of 2014, yet many organizations still know little about it, or have questions about its intent. Do you need to learn more about the CSF? Should you consider adopting the CSF? View this complimentary on-demand webcast where Ken Durbin, Strategist: CRM & Threat Intel, Symantec, will provide you with a solid understanding of...
August 23, 2016
Organizer: Symantec Government Team at Carahsoft
Location: Webcast
Add Favorite
Better Together: Government and Samsung KNOX
The Strongest Mobile Security Platform The Samsung KNOX Platform provides build-in defense grade mobile security for customers who need it most. In fact, Gartner gave Samsung KNOX the most "strong" ratings of any platform for Corporate Managed Security. Samsung KNOX is also the only platform with "strong" ratings for every security control listed in the Corporate Managed Security category according to the report*. For highly regulated industri...
July 21, 2016
Organizer: Samsung KNOX Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Trends in Network Modernization and Security
Federal networks are in the midst of a disruptive phase for the first time in more than a decade. Agencies are transforming their infrastructures to take advantage of new technologies in the cloud and on the software layer. Software-defined networking is growing across the government as a means to provide more security with less complex at lower costs, and with greater efficiency. Learning Objectives Discuss the cybersecurity benefits of netwo...
July 14, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Splunk for Security Bootcamp
About the Splunk Security Bootcamp – Should be attended by people specifically interested in applying Splunk to the Security domain. Both core Splunk and Splunk for Enterprise Security will be used in the lecture and hands-on lab. This class does not cover Splunk interface basics so it is helpful to have an understanding of Splunk basics before attending. Where: Live Hands-on WebEx Webinar Date: Check the GTRI Events Page for upcoming Bo...
July 6, 2016
Organizer: Global Technology Resources, Inc. (GTRI)
Location: Webcast
Add Favorite
Modernizing Federal Cybersecurity: Prot...
In the federal government, many agencies are tasked with using yesterday’s technology to protect today’s data. Maintaining legacy systems eats up 75 percent of federal IT dollars, leaving only a quarter of the budget for modernization and enhancement. But these older systems are increasingly vulnerability to cyberattacks, making those updates even more essential. With limited government IT budgets, how can agencies maximize the pro...
June 23, 2016
Organizer: Bloomberg Government
Location: Webcast
Add Favorite
Secure Data Broker - Creating Digital T...
Join us to learn how Secure Data Broker secures and manages APIs to provide states with a new model to share information while allowing them to retain control of their data.In this webcast, Jack Doane, former CIO of the State of Alabama, and Mat Keller, Principal Consultant with CA Technologies, will discuss how state and agency CIOs can become Secure Data Brokers to safely deliver enterprise data to citizens and partners on mobile and web pla...
May 24, 2016
Organizer: CA Technologies
Location: Webcast
Add Favorite
Back to Search Begin New Search