Back to Search Begin New Search Save Search Auto-Notify
5 Easy Wins to Achieving Zero Trust in...
Orca Security, in collaboration with GuidePoint Security invite you to this insightful webinar on June 18, 2024. Listen in as Neil Carpenter, Elizabeth Sims and Chris Romero delve into the challenges and solutions for achieving Zero Trust in the cloud. Hear insights revolving across the key pillars: Data Automation and Orchestration Governance Identities and Entitlements Application and Workload
June 18, 2024
Organizer: Orca Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Why MDR Requires a Holistic, Cost-Effic...
Join us for a panel discussion with Splunk and Alchemy Security around the real need for managed security services and the power of Splunk to drive your cybersecurity and threat detection strategies. During this session, the panelists will discuss the challenges with black-box MDR providers and why adopting transparent, holistic solutions are the preferred answer for highly targeted, public-sector organizations. Join this webinar to gain insig...
June 18, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
June 18, 2024
Organizer: Socure Government Team at Carahsoft
Location: Webcast
Add Favorite
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. Join CyberArk and UberEther on June 20th to explore the transformative journey from traditional, on-premises...
June 20, 2024
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Achieving Cybersecurity Resilience in S...
New Mexico recently issued Executive Order 2024-011, a comprehensive state-wide security assessment to identify vulnerabilities in cybersecurity and necessitates that all state agencies adopt the National Institute of Standards and Technology (NIST) standards for cybersecurity by November 1, 2024. Register now to hear how Synopsys can help you navigate the requirements of EO 2024-011 and secure your critical applications. Join Synopsys on Jun...
June 20, 2024
Organizer: Synopsys Government Team at Carahsoft
Location: Webcast
Add Favorite
Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
June 25, 2024
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Ransomware: Healthcare in the Crosshairs
A recent study by Comparitech revealed that in the last several years, there have been more than 500 successful ransomware attacks impacting nearly 10,000 healthcare providers. It is estimated these attacks have bled the US economy by tens of billions of dollars, but more concerning is the risk to human life. A study by Ponemon, which surveyed 653 IT and IT security practitioners, revealed that 46% noted increased mortality rates and 38% noted...
June 25, 2024
Organizer: Halcyon Government Team at Carahsoft
Location: Webcast
Add Favorite
Demo Desk: Device Patching & Intelligen...
Register for this event and learn how the integration between Forescout and Microsoft can work to overcome today’s challenges such as supporting organizations BYOD (bring your own device) scenarios for hybrid workforces while adhering to zero-trust security principles. Join this webinar to learn how with this integration, security managers can: Achieve a broader understanding of their security posture. Visualize key control metrics. Resp...
June 25, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search