Get Employees Up and Running Faster: Th...
Government agencies need to onboard new employees as quickly as possible. That means equipping new hires with the IT tools they need to do their job. Increasingly, agencies are working with hardware providers to configure new workstations at the factory — giving employees the exact hardware, software and security protocols they need, right out of the box. On June 20, join Government Technology and HP for a 30-minute webinar on this next-...
2024 State of Security Automation Survey
Automation plays a vital role in improving capacity, efficiency, and performance in the SOC. Security teams spend far too much time “in the weeds,” unable to focus on solving the problems that matter. Security orchestration, automation, and response (SOAR) tools have the potential to streamline analysis, reduce response times, and improve quality. However, SOC teams often struggle to realize the full potential of this kind of autom...
Get Real Data, Take Real Action: Insigh...
In a world where expectations for government services are higher than ever, understanding constituents' needs is essential. Our latest survey, conducted by the Center for Digital Government in partnership with Zoom, uncovers vital data on how people interact with state and local agencies. Join Government Technology and Zoom for a live webinar on June 25, where we'll dive into this eye-opening research - You'll learn about the latest trends, pr...
Advanced Network Defenses for Today’s F...
The modern enterprise, characterized by hybrid and mobile workforces supported by a hybrid cloud IT environment, brings many security challenges to the federal government, its agencies, entities, and sites. They face multi-faceted cybersecurity concerns due to the sensitive nature of their data, the critical infrastructure, and regulatory mandates involved. The distributed nature of operations, with numerous contractors and providers, introduc...
Is Access to Corporate Resources from a...
In today's dynamic digital landscape, the need for secure and seamless access to corporate resources from any device, anywhere is paramount. Join SANS Senior Instructor Dave Shackleford and HPE’s Darren Tidwell for an insightful webcast where we dive into the modern threats and security challenges that organizations face, and how innovative solutions like SSE from HPE address these challenges head-on. HPE Aruba Networking SSE securely co...
Digital Transformation: Are We Truly Re...
Digital transformation has become a north star for organizations looking to become more efficient and intelligent. It aims to shift organizations from siloed systems to streamlined enterprise solutions, promoting data democratization and automation. This evolution was expected to enhance efficiency, accessibility and support. But have we achieved these goals? A key digital transformation success factor is a comprehensive data management system...
Practical Threat Modeling Based on Comm...
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
Continuous Attack Surface Discovery and...
As the nature of our technology landscape changes more and more frequently, it’s challenging for many security operations teams to keep pace with the current threat surface we have on the internet, as well as the state of vulnerabilities and risks associated with these assets. Many security teams are performing vulnerability and web application scanning in a relatively ad hoc manner, and don’t truly have a continuous view of what e...
SANS 2024 SOC Survey: Facing Top Challe...
In 2024, the SOC Survey continued to explore the detailed aspects of cybersecurity operations centers. The survey collected information on organizations’ capabilities, and what is outsourced. On this webcast, SANS Senior Instructor Chris Crowley examines survey results to understand how SOCs are architectured, favorite and frustrating technologies, staffing, funding, threat intel, and automation. Register for this webcast now, and you wi...
Carahsoft Government Solutions Forum
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.