Back to Search Begin New Search Save Search Auto-Notify
DoDIIS 2022 Webinar Series: High Trust...
Anjuna and Carahsoft are excited to invite you to a webinar session leading up to DoDIIS 2022 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. Anjuna's Confidential Computing is a new breakthrough technology that shields data during runtime and creates high trust environments in the hybrid cloud. It leverages modern hardware to create a secure enclave in which da...
Add Favorite
Automate Evidence Collection: Manage Cy...
Is your GRC strategy enabling information security activities within your organization? Today's audit and compliance practices require time and resource-intensive information-gathering techniques that produce static and “point in time” results. Organizations can streamline information and evidence gathering by leveraging existing system data, creating objective evidence, maintaining compliance, and reducing risk. Join us for an inf...
Add Favorite
Addressing Cloud Security Vulnerabiliti...
Please join Orca Security and Carahsoft for an informative session on cloud security vulnerabilities in the education sector hosted by Devin Crear, Sr. Cloud Security Representative, Orca Security, and Patrick Burke, Sales Engineer, Orca Security. Educational institutions continue to be the highest victimized sector even when compared to healthcare technology, financial services, and manufacturing. A recent study in the education sector found...
Add Favorite
Protecting Critical Infrastructure
When most people think about connected devices, they think smartphones or tablets, but that's just the tip of the iceberg. All kinds of smart devices and sensors are connected to your network. Protecting your network isn't easy, but it's made more challenging when you don't have visibility into an increasing number of unmanaged sensors and IoT devices. Gigamon and Armis want to help eliminate your blind spots with Gigamon Visibility and Analy...
Add Favorite
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
Add Favorite
Brand Protection and Enhanced Email Sec...
Anyone involved in email security today is likely familiar with the Domain-based Message Authentication Reporting and Conformance (DMARC) standard and its role in helping to secure email from threats like spam, phishing and email spoofing. But what is DMARC exactly, and how does it add another layer of security to business email systems? Register now to join Brad Allen, Sales Engineer at Mimecast, to learn: How to gain insight and control ove...
Add Favorite
Mastering Cloud Security with Prisma Cloud
In today's digital landscape, security is essential for resource and application deployments. Whether it's in private data centers or the public cloud, the complexity of cloud-native environments presents unique challenges. Rapid developer movements, fully automated workflows, and segmented security teams can lead agencies to deploy applications on cloud-provisioned resources without adhering to proper security protocols. This oversight can re...
Add Favorite
Freedom within Fences: Unlocking Data A...
Government agencies and higher education institutions struggle with data silos and timely analysis to uncover critical insights for their stakeholders. Join us for the upcoming webinar to learn how Strategic Innovation Group (SIG) can help government agencies and Higher Education institutions unlock data insights in a secure self service model by leveraging the combined power of Denodo and Alteryx. Government and Education institutions can acc...
Add Favorite
Enabling Cloud Confidence
The biggest barrier to successful cloud adoption is often trust. Trust that a team won't cause a runaway cloud bill or run afoul of a compliance standard. Trust that an IT organization can deliver the support necessary to help a team get things done in the cloud. IT organizations in higher ED and state governments are similar when it comes to tackling cloud challenges: both have common roles and mandates around serving citizens and students co...
Add Favorite
Best Practices for Implementing Zero Tr...
As governments and educational institutions strive to meet public demands for access to data-driven services, they face the critical challenge of securing sensitive data against cyber threats. To address this challenge, government and educational institutions need to adopt a modern security approach like Zero Trust. During this webinar, you will hear from industry expert David Cagical, former CIO for the State of Wisconsin, and Matt Singleton,...
Add Favorite
Back to Search Begin New Search