Digital Transformation: Adhere, Comply,...
Join a fireside chat with industry leaders providing insight and perspective on the Executive Order 14028 and the state of cybersecurity in the Federal government. Improving the Nation's Cybersecurity based on subsequent guidance from CISA, United States Digital Service, Federal Risk and Authorization Management Programs and the National Security Agency. During this webinar, attendees will gain knowledge on: How a Cloud Native Application...
How to Leverage AI to Optimize Your SOC...
Security Operations Centers struggle to keep pace with modern cybersecurity threat requirements. The volume and speed of threats (IOCs and IOAs) are well beyond the processing capabilities of even experienced security analysts, and this constraint doesn’t factor in the cost of these systems, which are expensive to buy, integrate and maintain. In this webinar, Tracy Williams from Anomali will discuss the application of innovative AI techn...
Venafi Customer Forum
Please join Venafi & Carahsoft as we host this two-day event to learn from one another about today’s machine identity management challenges and solutions. The key takeaways you will gain from this event: Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management. Future-Proof Your Cybersecurity...
Seal the Cracks: Strategic Supply Chain...
Join Archer and Carahsoft for a crucial webinar addressing the escalating challenges posed by supply chain cybersecurity risks in government networks. This webinar will delve into: Understanding common supply chain and third-party risks. Proactively addressing and mitigating supply chain attacks to bolster organizational defenses. Leveraging NIST 800-171 best practices to fortify software supply chains against vulnerabilities. Exploring NIST N...
Improving the Nation's Cybersecurity -...
Examine how government and industry is adapting to the shifting landscape for cybersecurity Red Hat and the National Institute of Standard and Technology are co-hosting the third annual Cybersecurity Open Forum – Improving the Nation’s Cybersecurity, in Washington, DC. This in-person event will be an opportunity to hear from some of the brightest cybersecurity professionals to hear about the nature of cybersecurity vulnerabilities...
Unlocking Comprehensive Protection thro...
State and local agencies are top targets for cybercriminals, with data breaches costing millions per incident. Learn how to safeguard your data and save money with Symantec Endpoint Security Complete (SESC). In this webinar, you will: Discover how SESC secures all your endpoints, minimizing the risk of cyberattacks Dive into innovative approaches to optimize endpoint protection and adapt to evolving threats Learn how SESC's user-friendly i...
NIST CSF 2.0 - A Playbook for Supply Ch...
Digital supply chains are complex and critical systems. In a rapidly evolving cyber landscape, supply chain security remains a top concern for organizations looking to solidify their protection strategies. Many organizations look to NIST for direction when setting their cybersecurity strategy. The new version of the Cybersecurity Framework (CSF 2.0) has recently been released and provides best practices to help navigate the evolving threat lan...
Navigating Cybersecurity in the Defense...
Please join Quzara and Carahsoft on April 25, 2024 for a critical discussion on the evolving threat landscape, practical defense strategies, and the intricate web of regulatory compliance shaping the future of defense cybersecurity. Attend to experience: Expert Insights: Hear from a distinguished panel, including voices from Microsoft's Defense and Aerospace teams, the DOD DC3 Crime Center, the FBI, and Schellman, a C3PAO focused on CMMC. Real...
Unlock the True Power of Zero Trust thr...
In today’s digital landscape, corrupt content poses unprecedented challenges to cybersecurity. The mass proliferation and fragmentation of content communication systems (file-sharing services) has created threat opportunities that must be addressed urgently. Register now to learn how Kiteworks-enabled Private Content Network (PCN) and Forcepoint’s Zero Trust Content Disarm and Reconstruction (CDR) has combined to create a groundbre...
Mandiant Incident Response Services for...
Join us to learn how Google Public Sector & Mandiant approach helping public sector and education organizations reduce their organizational risk in the event of a cyber attack. Our experts will provide an overview of the Mandiant Incident Response Services and how they can help increase confidence in their operations before, during or after a cyber incident. Given the limited budgets and lack of cybersecurity talent, these services can he...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.