Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

ThoughtSpot Learning Series
Join ThoughtSpot and Carahsoft for this on-demand exclusive webinar series. We discuss numerous topics related to our ThoughtSpot platform and teach participants the core end user functionality of ThoughSpot. Now more than ever, it is critical for everyone to have rapid access to facts. ThoughtSpot can unite organizations across the public sector to mitigate the impact and fight the spread of COVID-19, by providing decision makers with instant...
Add Favorite
ThoughtSpot Learning Series
Join ThoughtSpot and Carahsoft as we invite you to this exclusive webinar series. We will discuss numerous topics related to our ThoughtSpot platform and teach participants the core end user functionality of ThoughSpot. Now more than ever, it is critical for everyone to have rapid access to facts. ThoughtSpot can unite organizations across the public sector to mitigate the impact and fight the spread of COVID-19, by providing decision makers w...
Add Favorite
ThoughtSpot Learning Series
Join ThoughtSpot and Carahsoft for this on-demand webinar series. We discussed numerous topics related to our ThoughtSpot platform and teach participants the core end user functionality of ThoughSpot. Now more than ever, it is critical for everyone to have rapid access to facts. ThoughtSpot can unite organizations across the public sector to mitigate the impact and fight the spread of COVID-19, by providing decision makers with instant answers...
Add Favorite
Network Metadata: Exposure Risks and Remedies
Network Metadata: Exposure Risks and Remedies High Speed Network Encryption Webinar Series Ethernet encryption mitigates communication exposure but its associated metadata can be intercepted in order to deduce patterns through traffic analysis. These patterns are often just as useful to hackers as the data itself. To guard against the risks associated with malicious traffic analysis, agencies need to leverage an approach known as transmission...
Add Favorite
Professionalization and the Cybersecuri...
The increasing frequency and scale of reported cyber attacks, highlights the need for a cybersecurity workforce of sufficient size and quality to meet the evolving threat environment. To address this need, some cybersecurity experts call for enhanced professionalization requirements. Certification, licensure, skill-based competency exams, and a national association all have been advanced as components of a comprehensive workforce strategy to a...
Add Favorite
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
Add Favorite
"Women in Security: Building for the Future"
It’s no secret that the information security profession is lacking female minds. In fact, the 2015 (ISC)2 Global Information Security Workforce Studies study shows that women represent only 10% of the industry. Awareness is certainly improving, as evidenced by a recent increase in women-focused professional events. Yet, as the (ISC)2 studies have shown, the proportion of women to men has been stubbornly stagnant. The number of women in i...
Add Favorite
Introduction to Peach Fuzzer and fuzzin...
An on-demand webinar that introduces Peach Fuzzer and overviews our fuzzing technology. Peach Fuzzer is an automated security testing platform that finds unknown vulnerabilities in software & hardware systems, IoT & embedded devices. We help identify unknown vulnerabilities so you can close them and help prevent zero-day attacks.
Add Favorite
Share Files Securely - Learn from the C...
Does your organization struggle to send large files, manage a complex system of content stored in multiple locations, and securely collaborate with outside parties on confidential documents?The City of Pleasanton faced these challenges and more, but Allen Hammond, Director of Information Technology for the City of Pleasanton, found and implemented a solution. Join Allen for this webinar as he discusses how the City of Pleasanton: Collaborates...
Add Favorite
Back to Search Begin New Search