Back to Search Begin New Search Save Search Auto-Notify
Protect Your Controlled Unclassified In...
Classified Unclassified Information (CUI) is the path of least resistance for adversaries, and loss of aggregated CUI is one of the most significant risks to national security. Protecting your CUI is the most critical data protection topics for 2021. If your agency is only using encryption of data-at-rest (db) and encryption of data-in-transit (SSL); you are significantly exposed when your data is utilized and displayed within your apps. Your...
Add Favorite
Protect Against Ransomware and Destruct...
This on-demand webinar Explores how Dell EMC's PowerProtect Cyber Recovery helps provide maximum protection to critical data and reduces the downtime associated to data loss in the event of a cyber-attack. With multiple layers of protection and security, Dell Technologies offers a turnkey solution that can monitor data integrity. Their secure digital vault can easily isolate data from the attack surface with an operation air gap to ensure wor...
Add Favorite
Enabling Secure Data Recovery Within Yo...
View this on-demand webinar to learn about: How to manage the entire data recovery incident: job submission; prepaid device enrollment; shipping; and reporting Supporting work from home with a workflow designed around the widespread adoption of Bring Your Own Device (BYOD) and the increasingly mobile (and home-based) workforce Learning how enrolling devices in a protection plan streamlines admin processes, lowers costs, and meets SLA's How to...
Add Favorite
Accelerate Security, Agility, and Visib...
Maintaining physical, on-prem servers can be expensive. Between the hard cost of on-prem equipment and the soft labor cost to maintain these systems, it's no wonder that more businesses are taking their holistic digital ecosystem to the cloud.View this on-demand webinar supporting your cloud migration efforts. As more critical workloads move to AWS, you need to gain critical security, operational, and cost management insights across your entir...
Add Favorite
Unit 42 by Palo Alto Networks
Unit 42 brings together world-renowned threat researchers with an elite team of security consultants to create an intelligence-driven, response-ready organization. As threats escalate, Unit 42 is available to advise federal agencies on the latest risks, assess their readiness and help them recover when the worst occurs. Whether responding to a breach or managing cyber risk, Palo Alto Networks understands your challenges. Hailing from US govern...
Add Favorite
DNS Security Data Exfiltration Workshop
View our on-demand recording enablement security workshop. In June 2020, the NSA Cybersecurity Director said that securing DNS can stop 92% of malware attacks on a network. Next-gen firewalls and endpoint tools have left behind DNS-based security blind spots. This workshop will walk system engineers through the conceptual abstracts of DNS security and bring a hands-on demonstration to enable attendees to test a network for DNS security gaps....
Add Favorite
State & Local Security Thought Leadership
The cyber theft of private and confidential information from government agencies, business, and private individuals exceeded $6 trillion in 2021. The modern spy is responsible for these technologically advanced attacks targeting your data.Join VMware, WWT, and Carahsoft for an informative talk with Eric O'Neill, VMware's National Security Strategist. Hear him discuss real-life spy stories and a review of recent massive cyber-attacks to show ho...
Add Favorite
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
Add Favorite
Enhance Your Security Posture with Info...
Cybercrime is growing in complexity and scale, but security teams cannot respond to incidents fast enough. Improved response times requires multiple stakeholders, better information and processes. Throwing more people at the problem is not possible, nor the correct solution. Implementing and integrating security tools that allow you to simplify, do more with less and build adaptive security architectures to protect your critical infrastructure...
Add Favorite
SOAR Into Advanced Cyber Defense with S...
Join Splunk and Carahsoft for a presentation and demo where we will discuss how Splunk Phantom can help your team achieve optimum security operations regardless of what security tools or SIEM you're using. Through Splunk Phantom, users will be able to leverage technology for orchestration and automation as an integral part of their Security Operations Center (SOC) platform to accelerate incident response while addressing the skills shortage. T...
Add Favorite
Back to Search Begin New Search