Networking Reception ~ NC Digital Gover...
Join Carahsoft for an evening of networking immediately following the first day of the North Carolina Digital Government Summit. Continue conversations with your peers over hors d’oeuvres and an open bar. Coquette Brasserie is located conveniently, one mile away from the Hilton in Raleigh’s North Hills. Save your seat – limited spots remain!
Actionable Intelligence: Stay Smart. St...
Just over a year ago, OPM announced the massive data breach that affected millions of current and former Federal employees – putting an even brighter spotlight on government cyber security. This August 30, the Symantec Government Symposium, a one-day cyber event convening 1,000 attendees from the public and private sectors, will feature four break-out tracks covering cyber intelligence, risk management, insider threats, and much more. P...
Envisioning a Modernized Contact Center...
There are increasing requests for service across channels, and daunting challenges to deliver more with older, disconnected systems, multiple knowledge sources, and smaller budgets. The rapid evolution of new technology, including social, mobile, and cloud, is fundamentally changing customer expectations regarding how, when, and where they interact with both commercial and public sector organizations. Join Salesforce for an on-demand webinar,...
Digital Trust Webcast: How Identity Tac...
When it comes to privacy and security, citizens have high expectations from their agencies. At the same time, data breaches continue to rise, while data privacy regulations are increasing. To earn trust from your customers, you must build new offerings across web, and mobile-connected devices in a way that demonstrates that personalized touch they crave while maintaining data privacy. Join ForgeRock and Carahsoft for our on-demand webinar wher...
Protecting Your Agency and Data from Ra...
EMC, RSA, and Carahsoft are hosting an exclusive briefing for federal agencies to share intelligence and lessons learned. Space is limited, so don’t miss this great opportunity! Since the start of this year, there has been an increase in frequency and sophistication of ransomware attacks. Criminals deploy ransomware everywhere and hold entire organizations hostage on a daily basis. To combat these threats, federal agencies need to think...
Behind the Scenes: The Value of Electro...
Government organizations are transitioning to digital processes as they look for service improvements and efficiencies. Yet, obstacles can arise when going 100% digital. Adobe Sign has reinvented the signature process to help your agency deliver complete digital experiences to citizens and personnel, while achieving greater compliance and saving time and money. Join Taborda Solutions and Carahsoft for an Adobe Electronic Signatures Seminar in...
Achieve Dynamic Perspective and Unbiase...
The Veritas Information Map renders your unstructured data in visual context and guides users towards unbiased, information-governance decision-making. Using the dynamic navigation in Information Map, customers can identify areas of risk, areas of value, and areas of waste across their environment and make decisions which reduce information risk and optimize information storage. Join Veritas and Carahsoft on Thursday, August 25th for a complim...
Take a Coffee Break With Apptio to Lear...
Apptio understands how FITARA affects IT spending and why there is a need for a standard approach. Our TBM Unified Model (ATUM) can help you with your FITARA compliance. View this short 20 minute on-demand webinar and hear how we can help to improve your report card score and gain greater insight to your IT spend. You will hear how to leverage TBM to manage your IT costs and tackle your IT challenges such as: Data Center Consolidations IT Mod...
Stay Ahead of Today’s Relentless Cyber...
You have fortified your networks with meticulous layers of defense in depth, but threats are continuous and increasing, which is leading to new security regulations and mandates. Complicating things further is the need to move to cloud services while maintaining your defense in depth and security compliance in an environment outside your control. What are the gaps, and what can be done? Join us for a complimentary webinar detailing Akamai...
Intelligent Insider Threat Detection
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring information, such as system, access, facility, and print logs. The real challenge to uncovering the next insider threat is understanding behaviors and intent that often lay hidden within massive volumes of human communications, such as emails, chats, and open source document...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.