Back to Search Begin New Search Save Search Auto-Notify
Using G Suite to Cut Costs, Enhance Sec...
Please join Google and Carahsoft for a webinar to understand the value of G Suite and how to innovate by leveraging Cloud-based solutions. Learn how the public sector is improving citizen services & engagement, increasing operation efficiency, and delivering proven innovation with Google's highly secured, powerful technology. During this webinar, you will learn about: Innovative email & collaboration technologyGovernment-specific use c...
Add Favorite
Cipher Summit 2019
Save the date for our SafeNet AT 2019 Cipher Summit! Attendees will hear from their peers, industry pundits, and technology experts about the current federal cyber security landscape and learn about the solutions needed to help solve the most pressing security issues.This one-day event will also feature technical sessions designed to help SafeNet AT customers' better leverage their current solutions and provide a forum for interactive discussi...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Splunk Webinar Series: To the Basics an...
Curious about how Splunk can help your organization? Join us for this informative on demand webcast series where we will discuss a variety of topics ranging from Splunk 101, machine data, IT operations, security, and more. This series will provide a wide overview of how you can leverage your machine data, gain real-time insights, and make smarter business decisions within your agency. There's An App for That: Splunk Security Essentials Your or...
Add Favorite
Get Ahead of Ransomware with Splunk & AWS
From medical record systems to public transportation infrastructure, the onslaught of recent ransomware attacks has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of these attacks shows that ransomware is a greater concern that affects all of IT.How can you better prepare and respond to such threats?Join us and learn how to apply broader analytical approach and data-driven...
Add Favorite
Addressing Malware: A Layered Security...
What do the City of Albany, City of Atlanta, City of Baltimore, Cleveland Hopkins International Airport, North Carolina's Onslow Water and Sewer Authority, and The United States Department of Homeland Security have in common?Ransomware.We've all heard of ransomware before, but how do we understand the associated risks and prevent it, given limited resources? If your organization believes it could be better protected against ransomware, join Ca...
Add Favorite
Advancing the Maturity of Your Organiza...
As recent as five years ago, putting up strong network controls and ensuring a defense-in-depth posture was enough to keep the bad actors out of a network and minimize the risk of a cyber-attack. However, times have changed and the delineation of organizational perimeters has blurred between on-premise and cloud-based resources. This is especially true due to the increase in users needing to access resources and accounts remotely. Identity is...
Add Favorite
Secure Your Move to Cloud with Zero Tru...
The promise of cloud and mobility is to provide access to key services quickly and comprehensively - any user, any location, any time, any device. Security teams are embracing technologies that ensure productivity while retaining visibility and control, as applications migrate from datacenter to cloud and users are increasingly outside any security perimeter.To clarify this complex topic, NIST has published Draft Special Publication 800-207, d...
Add Favorite
Protect against Ransomware
This webinar will explore how Dell EMC and RSA can successfully help secure your infrastructure, increase your platform efficiency, and simplify your management processes. Join us for an on demand webcast to learn more about how to secure your workspace with data protection and threat detection. During this webinar, you can expect to learn about: How Dell EMC's Cyber Recovery solution can help protect data, identify suspicious activity, and pe...
Add Favorite
Web Series: Demystifying Cyber Threat H...
Traditional cybersecurity practices are failing to detect threats that exist in the gaps of networks and cyber teams. Cyber tools are only alerting us to what we know, but do not indicate new security risks unique to individual agencies. With threat hunting, security risks can be identified throughout the entire network revealing gaps in your agency's security that common cyber tools miss.Join CybernetIQ and Carahsoft for our web series to div...
Add Favorite
Back to Search Begin New Search