Back to Search Begin New Search Save Search Auto-Notify
Splunk ESI Contract and NAVSEA
Navy has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk. View this on-demand webinar where participants discussed: How the contract has been structured The value it brings to Navy How to leverage the contract
Add Favorite
Zscaler CMMC Webinar Series
The DOD’s Cybersecurity Maturity Model Certification, or CMMC is designed to protect its Supply Chain partners from cyber-attacks. CMMC will require any company providing a product or service to the DOD, directly, or indirectly, to achieve CMMC certification by 2025, with some contracts already calling out CMMC as a requirement. This will impact roughly 300,000 companies and over $400B of DOD contract awards annually. View this two part...
Add Favorite
Security on the Seas Webinar Series: IT...
View this on-demand webinar to learn how network visibility and verification are key to ensuring your zero-trust network architecture. Learn how a behaviorally accurate mathematical model, or Digital Twin, enables you to PROVE your network security posture. And determined blast radius of a compromised host, do full endpoint analysis, check your OS vulnerability… Zero-trust, but verify.
Add Favorite
Security, Visibility and Management for...
Government agencies are utilizing Micro-Service Architecture (MSA), the predominant design pattern for application development, but these evolved patterns have introduced new challenges and complexities to understand. James Harmison, a senior solutions architect at Red Hat with over a decade of experience in operationalizing applications for enterprise use, addressed: The concerns that teams have as they try to deploy MSA applications into pro...
Add Favorite
DoD Scaling RPA to Improve Mission Readiness
During this webinar attendees learned: How building automations from the ground up, capturing innovation money, and developing robots will not only work at on Air Force base but will rapidly scale across the service and DoD Why a bot for every soldier, airman, and sailor needs a Robotic Operations Center (ROC) Why RPA is a major transformational technology/solution Why hyperautomation is the framework for an integrated and robust digital force...
Add Favorite
FREE/ON-DEMAND: Assessing ITAR Complian...
Assessing ITAR Compliance Programs REGISTER NOW TO VIEW THIS COMPLIMENTARY WEBINAR ON-DEMAND! This webinar takes a deep dive into the State Department's recently published ITAR Compliance Program Guidelines and their prescription for a healthy, risk-based trade compliance program that keeps pace with the daily business developments of an organization. We discuss three key principles common to all trade compliance programs: No two companies are...
Add Favorite
Work Smarter with Sensor Networks
Presented by GISinc and Cityworks Learn how sensors can improve the way we detect, trigger and respond to events in nearly any industry you can imagine. We cover: Sensor-based work Leveraging new or existing technology Applications in a wide range of industries Industry insight from our special guest: Cityworks! Industries that will benefit from this episode: Education Systems, Defense, Healthcare, Oil and Gas, Private and Public Sectors, Publ...
Add Favorite
7 Steps To Winning FED GOV Q4 Contracts
Join Jennifer Schaus & Associates for a special webinar on 7 STEPS TO WINNING Q4 CONTRACTS. Please see our website for our full webinar schedule. All webinars are recorded and complimentary. Recordings are posted on our YouTube channel and website once complete. Thank you!
Add Favorite
Turn Your Endpoints Into Defendpoints
Everyone knows that cybersecurity must be a top focus for public sector agencies. The prevalence of attacks - only increasing over the last few years - has offered plenty of new insights into how different endpoints are being targeted. With the growing number of endpoints within agencies, opportunities to break through and compromise systems are extensive. Agencies must ensure that all of their endpoints are completely protected and immune to...
Add Favorite
The Exponential Strategic Advantage of...
Efforts to keep the nation safe, hinges on our strategic and tactical advantages. Machine learning (ML), a subset of artificial intelligence (AI), provides unparalleled insights into large data sets. These insights are critical to maintaining military superiority and safeguarding our nation's interests.Join us to learn more about the role of open source software in this paradigm and how Red Hat can enable the DoD to leverage machine learning w...
Add Favorite
Back to Search Begin New Search