Back to Search Begin New Search Save Search Auto-Notify
Security on the Seas Webinar Series: Ob...
Carahsoft is excited to share our Security on the Seas webinar series featuring our partners. Join us and Trend Micro on July 15 to learn more about overcoming Zero Trust with Trend Micro. Visibility and analytics are a key part of the DOD Zero Trust Reference Architecture. Avoid cybersecurity risk by increasing visibility and enforcement within your Zero Trust Architecture. This webinar will examine a visibility and analytics solution that gi...
July 15, 2021
Organizer: Trend Micro Government Team at Carahsoft
Location: Webcast
Add Favorite
DOD Cloud Workshop
The Department of Defense's cloud strategy aims to transform virtually every aspect of the warfighting effort, and has resulted in a rapidly growing ecosystem of both general-purpose and fit-for-purpose clouds. Some of those efforts are unique to DOD, reflecting the scale, missions and austere operating environments of military operations, while others are readily transferrable to most any agency. All, however, hold valuable lessons for those...
June 15, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
Modernizing Missile Defense
As modernization efforts continue to transform many facets of defense, missile defense systems are no different. Digital transformation must ensure the interoperability of command and control networks, sensors and Integrated Air and Missile Defense (IAMD) systems. Systems are being built to deliver with the speed, security and insights necessary to maintain current defensive operations, while evolving to meet the future threat environment. Thi...
April 27, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Modern Security Battlefield: What 2...
ICIT Virtual Briefing | The Modern Security Battlefield While 2020 was fraught with tragic outcomes of social and economic proportions, security teams have learned many lessons on resilience and have orchestrated many technical innovations to secure a distributed workforce. An expanded attack surface, sophisticated breaches like the SolarWinds attack and a pressing need to improve operational efficiency, has reframed digital transformation pr...
April 8, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Zero Trust: Beyond the Moat
As technology evolves, so do the threats to its security. The remote work shift caused by the continuing pandemic has pressed security teams to reassess how they verify and allow access. Zero Trust is a strategy, not a product, which reimagines the way access is granted to users, to data and to applications. Devices, which used to be central to identity, now include personal computers and home internet connections, which are not government iss...
April 7, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
Federal Insights Exchange Session - Lif...
A 2019 Journal of the American Medical Association (JAMA) article offered an “…analysis of all US military casualties from October 2001 through December 2017 found that survival among the most critically injured casualties increased 3-fold during the course of the conflicts and that 3 key interventions (tourniquets, blood transfusions, and prehospital transport within 60 minutes) were associated with 44% of mortality reduction...
April 6, 2021
Organizer: ACT-IAC
Location: Webcast
Add Favorite
Cloud 101: Enabling and Securing Govern...
Mastering the cloud is essential to digitally transform your agency. Throughout this course, we will explore the ins and outs of cloud computing – how to leverage it to advance digital transformation and how to secure your cloud infrastructure for mission critical workloads. We’ll also uncover best practices for migrating to the cloud, how to build an infrastructure that supports both remote and onsite work, and how to acquire clou...
April 1, 2021
Organizer: MeriTalk
Location: Webcast
Add Favorite
Defense Readiness Workshop
In October of 2020, then-Defense Secretary Esper defined defense readiness as "our military’s ability to answer the nation’s call, and to fight and win, anytime, anywhere. … The question we must answer is this: if called upon to fight tonight, are we ready?" Ensuring that answer is "yes" demands change in every corner of the Department of Defense, and especially in the technology that will power tomorrow's military. Cybersec...
March 10, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
The Future of Data Sharing within the D...
New ways of working and sharing information have emerged within the Federal Government. This has pushed agencies to reevaluate their technology needs and develop plans to further their IT modernization strategy. For the DOD, specifically, the Joint All-Domain Command and Control (JADC2) is an initiative to revitalize the military’s current command and control (C2) infrastructure by establishing a combined, synergistic network of sensors...
January 28, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Nation-State Threat Landscape Overview: China
Join CrowdStrike for a Join CrowdStrike for a deep dive into the nation-state threat landscape of China. Joshua Shapiro, CrowdStrike’s public sector threat intel SME, will give a brief on the broader geopolitical context for the latest Chinese cyber activities, an overview of the primary threat actors responsible for Chinese offensive cyber operations, and these actors’ TTPs (tactics, techniques, and procedures). He will also share...
December 9, 2020
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Back to Search Begin New Search