Back to Search Begin New Search Save Search Auto-Notify
Unlocking Efficiency: Harnessing the Po...
Join us as we delve into the transformative potential of hybrid-cloud storage solutions in revolutionizing video surveillance data management for state & local education institutions. In an era where educational institutions face mounting pressure to enhance security measures while optimizing operational efficiency, the adoption of hybrid-cloud storage emerges as a game-changer, offering unparalleled flexibility, scalability, and cost-effe...
May 30, 2024
Organizer: Wasabi Government Team at Carahsoft
Location: Webcast
Add Favorite
To Succeed with Zero Trust & AI, Look t...
Ever since the issuance of Executive Order 14028, issued in May 2021 to improve cybersecurity across the entire government by implementing a zero trust architecture, federal agencies have been hard at work to meet the requirement. Then, in October 2023 – less than 18 months later – a new executive order, 14110, was released on the “Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.” These are...
May 31, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Adapting to Change: Zero Trust Integrat...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
From Silos to Synergy: Bringing Higher...
In the rapidly growing world of AI, organizations have a responsibility to modernize and secure their Data Solutions and trust their information is 100% reliable, auditable, and accessible. Eon Collective guides organizations to establish their sustainable solution to prepare for AI integration by leveraging standardized open-source methodologies to obtain a robust system of Business Intelligence. These methodologies align people, process, an...
June 6, 2024
Organizer: Collibra Government Team at Carahsoft
Location: Webcast
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
June 11-13, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
June 18, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Defend Your Expanding Attack Surface
There are plenty of benefits to innovative new technologies, from greater efficiency to cost savings to customer satisfaction. It is rare, however, for a new technology to truly replace existing IT – rather, it gets incorporated into or bolted onto current systems. This approach, along with the explosion of mobile devices and proliferation of software and SaaS applications, dramatically increases and clouds an Agency’s cyber footpr...
June 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search