263 webcasts found
+ 246 past events found
Back to Search Begin New Search Save Search Auto-Notify
See Concealed Threat Activity Before En...
Threat actors conceal lateral movement and data extraction within encrypted communications, making it incredibly difficult to detect when they are present. Gigamon Precryption™ technology is a breakthrough approach to increasing network deep observability in hybrid cloud infrastructure. This technology increases deep observability while simultaneously enabling organizations to meet encryption compliance standards. At the same time, Gigam...
Add Favorite
Embrace the Power of NinjaOne
IT leaders in state and local governments face unique challenges in supporting diverse agencies efficiently. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabili...
Add Favorite
Migrate, Optimize, and Modernize with V...
Attendees explored the capabilities of VMC on AWS to facilitate faster and more cost-effective cloud workload migration for their agency. They experienced the transformation of applications and infrastructure services using familiar tools and increased scalability. During our in-person workshop, subject-matter experts will review the following topics: Accelerating datacenter evacuations with VMC on AWS Procurement and certifications Customer...
Add Favorite
Secure And Hunt At Scale With Armis
In today's connected world, unseen threats like compromised vendors, malware and vulnerable devices hide within your supply chain. Managing this vast attack surface feels impossible. Enter the Armis Intelligence Center. Armis Intelligence Center unifies global threat intelligence with real-time data on every device, from IT to OT and IoT. Get deep insights into vendor security, compromised components and ongoing threats. Proactively hunt threa...
Add Favorite
Adopting Least Privilege Principles to...
Endpoint security serves as the frontline defense in protecting your organization's network from a wide array of threats originating from devices that connect to the enterprise network, such as laptops, smartphones, and tablets. These endpoints are often the targets of cyberattacks as they provide access points to the organizational network, making them vulnerable to malware, ransomware, phishing, and other sophisticated attacks. By securing t...
Add Favorite
F5 Distributed Cloud Webinar: F5 Federa...
Federal agencies face many challenges in the form of security-related mandates and moving applications to the cloud, such as FIPS and OMB M-21-31. As these requirements become reality, administrators addressing these technical hurdles increasingly find themselves augmenting cybersecurity and application delivery tools leading to tool sprawl. During this on-demand webinar, attendees learned how F5 can help address these requirements while prov...
Add Favorite
WEST 2024 Webinar Series: Fortifying th...
AFCEA WEST 2024 Webinar Series: Anjuna: Fortifying the Digital Frontlines: Confidential Computing for National Security Anjuna and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Attendees of this webinar learned: The importance of confidential computing Common use cases for customers of Anj...
Add Favorite
Building Strong Foundations for Enhance...
Modern citizens expect electronic services from their government to be on par with private sector offerings, which use data collected through forms to provide an experience that is tailored to them. The challenge of collecting, maintaining, and retrieving data from both clients and staff using outdated form systems can be daunting. Transitioning to advanced digital forms transforms this process, offering a streamlined method for data submissi...
Add Favorite
Protecting the 2024 Election: Be Prepar...
After the events of the past few years, security is in the forefront of election officials’ minds. The individual states are responsible for conducting elections, so the National Association of Counties (NACo) at its annual legislative conference just conducted a series of workshops and panels on the range of threats facing election workers and voters alike. While physical threats, intimidation and harassment are primary concerns, there...
Add Favorite
Meeting the Quantum Deadline: Migrating...
According to OMB M-23-02, agencies are directed to submit a prioritized inventory of information systems and assets, excluding national security systems, that contain CRQC-vulnerable cryptographic systems to ONCD and the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA). No later than 30 days after the submission of each annual inventory of cryptographic systems required under Section II of this memorandu...
Add Favorite
Back to Search Begin New Search