Back to Search Begin New Search Save Search Auto-Notify
Navigating CMMC Compliance: The Integra...
The recent notice of proposed rulemaking for the Cybersecurity Maturity Model Certification (CMMC) program made one thing for certain: the U.S. Department of Defense is serious about external service provider (ESP) security. Under the proposed regulation, U.S. defense contractors will need to pay close attention to their Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) who qualify as ESPs to ensure they also ach...
May 16, 2024
Organizer: BlueVoyant Government Team at Carahsoft
Location: Webcast
Add Favorite
Optimizing Human Performance in Tech Ev...
In today’s rapidly evolving technological landscape, government agencies face the daunting task of managing advancements in AI, cybersecurity, and more, while ensuring their workforce remains at the peak of performance. In the realm of agency operations, there are a multitude of challenges that arise, with increasing complexity and declining mental well-being among employees standing out as particularly significant risks to mission succe...
May 16, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Definitive Timeline: Federal Guidance o...
ReversingLabs and Carahsoft are excited to invite you to join us for a virtual, conversation-style webinar to discuss compliance and guidance initiatives that have shaped the federal government's policies on software supply chain security. Hear from Charlie Jones, Director of Product Management, ReversingLabs during this session where we will dive into the following topics: 2023's major federal initiatives for improving software supply chain s...
May 16, 2024
Organizer: ReversingLabs Government Team at Carahsoft
Location: Webcast
Add Favorite
Future-Proofing Federal Cybersecurity,...
As federal agencies navigate an ever-evolving landscape of cyber threats, the paradigm is shifting from traditional prevention tactics to prioritizing rapid recovery. This shift underscores the critical role of data protection and swift incident response. In this webcast, we will delve into how federal agencies are harnessing the power of innovative technologies such as artificial intelligence (AI), the internet of things (IoT), and machine le...
May 16, 2024
Organizer: GovExec 360
Location: Webcast
Add Favorite
Enforce Least Privilege Across Every Endpoint
Almost every cyberattack today involves the exploitation of privileges. Broad privileges and entitlements greatly expand the attack surface and leave your organization extremely vulnerable to security breaches. However, a least-privilege access approach requires that users and programs receive the least amount of permission when required to complete specific tasks. Least privilege is one of the most essential security measures for organizatio...
May 21, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
DoD: Embracing Continuous Monitoring
When there are shooting wars going on, even if the United States is not a participant the cyber threat level rises. U.S. financial aid to Israel and Ukraine – both of which are engaged against sworn foes of this country – means Russia and Hamas, respectively, see us as active allies with their opponents. Rather than kinetic war, they and other enemies look to cyberspace to launch attacks aimed at U.S. agencies and systems. As part...
May 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Key Insights From the 2024 Cyberthreat...
CyberEdge’s annual Cyberthreat Defense Report (CDR) has become a staple for assessing organizations’ security postures, for gauging perceptions of IT security professionals, and for ascertaining current and planned investments in IT security infrastructure. It incorporates dozens of insights from 1,200 security professionals from 17 countries and 19 industries. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as...
May 22, 2024
Organizer: ISC2
Location: Webcast
Add Favorite
Security Maturity: Strategies for Growi...
Join Splunk and 4xBolt to dive into the transformative impact of Splunk Security Orchestration, Automation, and Response (SOAR) and Enterprise Security (ES) solutions within the DOD customer landscape. Splunk is a leader in security and observability, serving clients across all DOD and Federal agencies. Splunk solutions offer top-tier visibility and orchestration. New customers quickly adopt and enhance security, while current customers activ...
May 22, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Resilient by Design: Rethinking Cyberse...
Step into the forefront of manufacturing resilience as we navigate today’s cybersecurity challenges. This dialogue with Matt Cowell, VP of Business Development at Dragos, and Mark Cristiano, Global Commercial Director – Cyber Security Services at Rockwell Automation, is dedicated to the shifting tides in cyber threats that manufacturers face, strategizing against the escalation of digital risks, and charting a progressive course of...
May 23, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Integrating SBOM and Vulnerability Resp...
The visibility that a Software Bill of Materials (SBOM) gives into the ingredients that make up software components is critical to understanding cybersecurity risks. But understanding is only part of the solution. Organizations need to be ready to act on vulnerabilities before they impact system security. Join ServiceNow to examine the synergies between ServiceNow's Vulnerability Response framework and the principles underpinning Cybersecurity...
May 23, 2024
Organizer: ServiceNow Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search