CyberSmart: Preparedness and Proactive...
With cyber threats on the rise, how can governments prepare to prevent, mitigate, respond to, and recover from such attacks? Vigilance against cyber threats requires not only significant investments in hyper-secure technology infrastructure, but also a highly skilled workforce. In Austin, hear from the federal, state and local leaders who are partnering across government, industry and academia to prioritize cybersecurity readiness through tec...
April 2, 2019
Organizer:
Carahsoft Location:
Austin, TX
Behind the Scenes: The Value of Electro...
Government organizations are transitioning to digital processes as they look for service improvements and efficiencies. Yet, obstacles can arise when going 100% digital. Adobe Sign has reinvented the signature process to help your agency deliver complete digital experiences to citizens and personnel, while achieving greater compliance and saving time and money. Join Taborda Solutions and Carahsoft for an Adobe Electronic Signatures Seminar in...
Improving Intelligence, Surveillance, a...
ISR video has become a cornerstone of military and national security operations worldwide. It is performed manually, with most of the ISR video going unviewed or unanalyzed. View this complimentary on-demand webcast where we will share: Current challenges with existing proprietary ISR video and audio analytics services and solutions New strategies to leverage current and future investments in ISR video analytics capabilities People, processes,...
Splunk for Information Assurance ...
Taking Compliance from a Costly Time Sink to a Security Enabler Regulatory Compliance - a term that engenders a visceral reaction in every agency, customer, and institution. Fines and penalties imposed by regulatory agencies can cripple your operations and cause significant operational impact in responding to audits. Many agencies estimate an average of six week level of effort in responding to audits for every application environment. So, jus...
Adobe Government Forms Forum
Join us on Tuesday, June 14, 2016 to learn how to streamline and simplify the collection of information and data for your agency with flexible, powerful forms technology from Adobe. This event will bring together leaders and innovators from the government IT community to discuss how outdated forms technology slows government’s performance and efficiency, and will explore easy and simple ways to increase the efficiency and productivity o...
Splunk Discovery Day
There are no limits to the value you can derive from your data - whether it's to improve your organization's security posture, automate compliance, enhance IT operations, optimize application delivery, or drive better insights through business analytics. At Splunk Discovery Day Norfolk you'll hear from industry experts, customers, and technologists on how they're turning machine data into actionable insights. Agenda: 8:00 - 9:00am Registration...
F5 | FireEye Next Generation Security A...
Breaches dominate the headlines today, but attackers have been successfully compromising organizations for years. However, there’s no question that recent well-publicized incidents have led to more leadership and board scrutiny toward companies’ security postures than ever seen in the past. The focus has become “Are we compromised?” and “If we were to be compromised, how quickly could we contain, respond, and rem...
DoD Cybersecurity Goals for 2016 and Beyond
Join F5 Networks, Dell, and Carahsoft to earn two (ISC)2 CPE credits and learn about the DoD’s recent announcement around its guidance on a Cybersecurity discipline. Learn how F5’s security solutions align with the DoD Cybersecurity discipline and help to secure your datacenter, networks and applications while meeting your mandatory requirements. During this SPAWAR Pacific TechTalk, you will learn: How to PKI enable your network d...
U.S. Cyber Adversaries: Tactics and Tec...
Join us for a presentation that will interpret nation-state threat actors and their techniques. We will analyze the rapidly evolving but highly contested domain of warfare: cyberwar. We'll define the various advantages that nation-states reap by embracing cyberwar and we'll contrast advancements in cyber with other technological and military achievements throughout history in order to measure the significance cyber is and will be playing in th...
Adobe RIA Webcast: Delivering Data to t...
Thank you for your interest! Delivering Data to the Edge Attendees of this webcast learned how rich application technologies running on DOD's Global Information Grid are reshaping the way commanders and individual warfighters make and communicate decisions, and saw real-world examples of how enhanced C4I capabilities are being delivered today on mature, time-tested software architectures, utilizing state-of-the-art visualization technologies.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.