Back to Search Begin New Search Save Search Auto-Notify
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
June 6, 2024
Organizer: UberEther Government Team at Carahsoft
Location: Webcast
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. Reserve a spot and earn up to 3 Continuing Professional Education (CPE) credits by taking th...
June 6, 2024
Organizer: Armis Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Gemini for Google Workspace: Developing...
Gemini for Google Workspace is a powerful collaborative partner that can act as an effective prompt, thought partner, source of accuracy and productivity booster—all while ensuring every user and organization has control over their data. In this session, you will learn about: Leveraging generative AI for enhanced efficiency Prioritizing public sector use cases for maximum impact Practical examples and best practices tailored to governmen...
June 6, 2024
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Assuring Change: Infusing Zero Trust in...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
From Silos to Synergy: Bringing Higher...
In the rapidly growing world of AI, organizations have a responsibility to modernize and secure their Data Solutions and trust their information is 100% reliable, auditable, and accessible. Eon Collective guides organizations to establish their sustainable solution to prepare for AI integration by leveraging standardized open-source methodologies to obtain a robust system of Business Intelligence. These methodologies align people, process, an...
June 6, 2024
Organizer: Collibra Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Sensitive SAP Data with Dyna...
The current regulatory compliance and cyber threat landscape is constantly shifting and coupled with digital transformation projects like S/4HANA migrations, protecting sensitive data within SAP systems is paramount. To secure sensitive SAP data effectively, organizations must implement data-centric security controls such as Dynamic Data Masking. Unfortunately, many organizations have a security gap when it comes to the data-layer of their SA...
June 6, 2024
Organizer: Pathlock Government Team at Carahsoft
Location: Webcast
Add Favorite
How The Procurement Cycle Works In Gove...
How The Procurement Cycle Works In Government Contracting REGISTER HEREhttps://www.govassociation.org/event-5546529 If you own a business that you want to expand from the commercial market to the government market, then this training session is for you. The government is the largest customer in the world and you should be selling your product or service to your country. Find out how you can expand your business by working with Uncle Sam. When:...
June 6, 2024
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
APEX, CMMC and Project Spectrum
Securing government contracts is becoming increasingly challenging due to stringent requirements such as FedRAMP and CMMC. If your clients aim to secure contracts with the DoD, join us for this timely web discussion, hosted by Cyturus, in collaboration with Carahsoft and The Cyber AB, exclusively for APEX Accelerator Consultants. This session aims to equip APEX Consultants with resources specifically designed for APEX consultants and their cli...
June 6, 2024
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
DigiMarCon Great Lakes 2024
DigiMarCon Great Lakes 2024 is your chance to ... Hear from some of the most audacious and thought-provoking speakers in the digital marketing, media and advertising industry. Gain insight into emerging strategies, the latest innovative technologies, and best practices to move your business to the next level. Network with thought leaders, reunite with your peers, and build your professional network. The 3rd annual DigiMarCon Great Lakes, the P...
June 6-7, 2024
Organizer: DigiMarCon Great Lakes
Location: Detroit, MI
Add Favorite
Back to Search Begin New Search