Back to Search Begin New Search Save Search Auto-Notify
Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
Add Favorite
Adversary Emulation at Scale with Rebel...
Rebellion Defense and Carahsoft invited you to learn how your agency can deploy automated adversary emulation with Nova and uncover the security weaknesses that have the greatest real-world consequence for your mission. Experts discussed how you can: Leverage advanced automation to emulate adversary tactics, techniques, and procedures (TTPs) at scale. Gain a contextualized understanding of how cyber defenses truly stand against real-world atta...
Add Favorite
How to Prepare for CMMC Mandate
RegScale and Carahsoft hosted this webinar to help you and your cybersecurity team prepare for DoD’s mandated Cybersecurity Maturity Model Certification (CMMC) program. Under the CMMC program, all Defense Industrial Base (DIB) contractors will be required to implement certain cybersecurity protection standards and perform self-assessments or obtain third-party certification as a condition of DoD contract award to better protect controlle...
Add Favorite
The New Cybersecurity Strategy - What Next?
We invite you to watch our webinar that occurred on May 24th, which aimed to provide solutions to the challenges posed by implementing current mandates, executive orders, and the new cybersecurity strategy. Navigating the complexities of implementing these measures can be a daunting task, and we at Veracode understand the difficulties faced by government agencies. Our esteemed panelists, Sam King, Chris Wysopal, and John Zangardi, are industry...
Add Favorite
The Business of Ransomware
Did you know there’s an entire underground economy around ransomware? In this webinar, Halcyon explained how Ransomware-as-a-Service (RaaS) groups operate, what an affiliate is, and how Initial Access Brokers (IABs) are the glue that holds them all together. The ransomware economy constantly changes, with groups disbanding or taking market share from competitors from quarter to quarter. Who will be crowned top dog in 2023? What you got o...
Add Favorite
TechNet Cyber 2023 Webinar Series: Prev...
Proofpoint and Carahsoft invited individuals and their cybersecurity teams to join them in an overview of TechNet Cyber 2023. Attendees learned how Proofpoint's people-centric solutions can improve current and future cyber threats. At the end of February, CISA released a Red Team analysis report that highlighted the need for agencies and organization to detect lateral movement techniques, train users on how cybercriminals leverage human-based...
Add Favorite
Enhancing Cyber Security Operations Lev...
As skilled cyber labor resources become scarce, and target attack surfaces increase, XDR technology provides the ability to correlate email, endpoint, server, cloud, workload, and network sources for stronger detection and greater insight. A roadmap to consolidating siloed point solutions provides alert prioritization, automotes many security workflows, and decreases time to detection and remediation of threats. In this on-demand webinar, atte...
Add Favorite
Hunting the Next Big Cyber Threat: A Da...
Recorded Future is the world’s largest commercial collector of real-time threat intelligence, analyzing intelligence from around 1 million distinct sources on the open and dark web. Join Laura Taylor, a Solutions Engineer, as she discussed how Cyber Threat Intelligence (CTI) teams can use Recorded Future’s powerful analysis to hunt down the next big cyber threat. The on-demand webinar included an overview of: Recorded Future...
Add Favorite
From the Front Lines to Leadership: How...
According to Chainalysis’ recent survey, 74% of respondents say agency employees currently are not well-equipped to investigate cryptocurrency-related crime. However, they’re seeing a rise in criminal activity. Access this on-demand webinar to hear leading experts discuss how law enforcement agencies can close the gap between this rise of criminal activity being seen on the ground and the limited resources agencies have to investig...
Add Favorite
Diving into BOD 23-01: Why Asset Visibi...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published the Binding Operational Directive 23-01 for Improving Asset Visibility and Vulnerability Detection on Federal Networks with April 3, 2023 deadlines for all FCEB agencies. CISA’s asset visibility requirements are doing a big part in moving the industry forward and evolving the overall approach to asset inventory while also highlighting the importance of a comprehen...
Add Favorite
Back to Search Begin New Search