Back to Search Begin New Search Save Search Auto-Notify
The Right MXDR Provider Leverages AI to...
The cybersecurity industry needs an additional 3.4 million skilled workers to protect against rising digital crime. Microsoft Defender Experts for XDR, a managed extended detection and response (MXDR) service that elevates threat-detection capabilities using AI technology combined with human expertise, can be utilized to fill in this workforce gap. Access our complimentary webinar to learn about use cases and case studies that show how modern...
Add Favorite
Elastic Battle of the Agencies
Join Elastic online on September 28th, 2023 at 1:00pm to practice defending your agency against cyber threats with your fellow state agency cyber professionals! You and your team will gain experience with Elastic Security in a gamified environment, where you will test your ability to target and hunt down threats in a capture the flag exercise featuring a real security breach scenario. Attend the event to: Learn best practices for protecting yo...
Add Favorite
USDA Cybersecurity Expo 2023
Red Hat will be attending the USDA Cybersecurity Expo from October 3 - 4 virtually. The 2023 USDA Cybersecurity Expo will provide its active participants with tactics to meet future challenges and trends in cybersecurity. Red Hat is the leader in open source innovation and one of the biggest contributors to the community. With Red Hat, public sector IT departments can deliver more value each year with a smaller budget and solve everyday challe...
Add Favorite
IDS: An Unexpected Key to Accelerating...
Public sector organizations wisely invested in Intrusion Detection Systems (IDS) to meet security requirements sufficient for the perimeter-based cyber threats of the time. However, today’s threat landscape is growing more complex and nefarious. As the urgency grows to combat modern advanced threats by adopting a Zero Trust security framework, public sector security teams find that standalone legacy IDS comes up short. Others may not yet...
Add Favorite
Catch A Hacker
Armis, Gigamon and Carahsoft completed a hands-on experience in the Armis platform, which will help you understand the ease of use, simplicity, and business value for your organization when responding to critical cyber incidents. The session dove into the intersection of Operational Technology (OT), Internet of Things (IoT0, and Internet of Medical Things (IoMT). In the face of such critical challenges, the Armis platform aligned with Gigamon'...
Add Favorite
Elevate Your Security Mindset with VMware NSX
In the ever-evolving security landscape, embracing change is no longer an option – it's necessary to combat cyber threats. VMware & Carahsoft invites you to join a transformative journey toward enhanced security and growth. Better security begins with a changing mindset towards roles, responsibilities, and processes. And the constantly evolving threat landscape has meant that organizations, and the people within them, need to embrace...
Add Favorite
How to Meet SLCGP Cybersecurity Requirements
Join Tenable and Carahsoft for an informative webinar as we walk through the SLCGP program, new 2023 NOFO requirements, and how SLTTs can meet requirements and improve their cybersecurity posture with Tenable technologies.
Add Favorite
CTO Sessions Fireside Chat: Edge-to-Clo...
The rise of cyber attacks signals the current approach to security isn’t working, and the industry must make a radical shift to ensure protection of its most important asset – data. Enter Zero Trust. A defined roadmap and lack of cohesive security solutions places the burden of technology integration and partner orchestration on the customer. This results in organizations implementing a self-defined approach made up of an assortme...
Add Favorite
Going Beyond Zero Trust Requirements
Zero Trust Architectures have become a focal point for the US Government in their efforts to improve the nation’s cybersecurity posture. Traditionally providing secure access to applications, including those hosted in the cloud, has forced agencies to make arduous compromises. They’ve needed to either sacrifice security for performance when bypassing security inspection, or performance for security by routing traffic through massiv...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Back to Search Begin New Search