Back to Search Begin New Search Save Search Auto-Notify
AWS Security Webinar: The Key to Effect...
It’s essential to protect your private data at all times, especially when you don’t control all the hardware and software components with access to that information. Encryption is a powerful way for organisations to maintain an appropriate level of data confidentiality and integrity. AWS offers many options for using encryption to protect your data in transit and at rest. A variety of features let you determine how much control you...
Add Favorite
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. View this two part...
Add Favorite
Google Cloud 2020 Webinar Series: Secur...
Google Cloud and Carahsoft invite you to a webinar to learn more about cybersecurity solutions and demonstrate specific use cases. Government agencies continue to modernize by expanding their services and migrating workloads to hybrid and cloud environments. These actions create rapid growth in the volume of log data generated by devices and systems. Security professionals rely on these logs for audit information, forensic evidence, and to det...
Add Favorite
Go with the Flow - Building Sustainable...
Security teams are working hard identifying, analyzing, and mitigating threats facing their organizations. Splunk Phantom allows you to harness the full power of your existing security investment with security orchestration, automation, and response. With Splunk Phantom, you can execute actions in seconds, not hours. Join Splunk and FCN for an on demand presentation and demo on the broad strokes of Splunk Phantom's automation engine. During th...
Add Favorite
Cofense's Security Trends: 2020 and Beyond
Join us as Cofense security expert, Andy Spencer, shares the latest insights on which phishing and malware threats you should be prepared for and ready to combat. As the threat landscape continues to evolve at a rapid pace, with new threat vectors emerging and increasing in sophistication, Andy will share a more in-depth perspective of what to expect through the remainder of 2020 and beyond. Between the Cofense research teams and their Phishin...
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Add Favorite
Genius Machines: Great Power and the Pa...
In the last five years, the tools used in defense have evolved from a staple of science fiction to a real-world magnet for large-scale investment. In Hawaii, that means channeling technological advances for Indo-Pacific security. As the administration's defense strategy has pivoted towards China and great power competition, how is the U.S. matching new capabilities to new strategy, and what needs to happen next?Join Defense One and Nextgov for...
Add Favorite
Adobe Digital Government Technology Con...
Adobe and Carahsoft invite you to join us for the 2019 Adobe Digital Government Technology Conference to discover how Adobe is leading in digital transformation across federal, state, and local agencies. This year's conference will feature sessions geared around digital government and customer experience (CX) best practices through tactical learning tracks covering web modernization, outreach and engagement, forms and document transformation,...
Add Favorite
Back to Search Begin New Search