Back to Search Begin New Search Save Search Auto-Notify
Adobe Flash End-of-Life Webinar Series
Most eLearning content is based on the technology of Adobe Flash, but by the end of 2020, Adobe will stop supporting Flash and Flash Player. View our on-demand webinar series to learn how to transfer your eLearning content over from Adobe Flash and discover the endless possibilities of HTML5! The Road Forward: Using HTML5 as an Adobe Connect Host Adobe Connect is seeing its most significant change to date. Join us to learn more about this exc...
Add Favorite
Adobe Flash End-of-Life Webinar Series
Most eLearning content is based on the technology of Adobe Flash, but by the end of 2020, Adobe will stop supporting Flash and Flash Player. View this on-demand webinar series to learn how to transfer your eLearning content over from Adobe Flash and discover the endless possibilities of HTML5! Conversion Crash Course: Updating Your Materials with Only 4 Months Left If you’re joining this program already in progress, you may not have beg...
Add Favorite
Adobe Sign Webinar Series: Embrace Seam...
As organizations across the country continue to operate remotely, digital processes, such as e-signatures, have never been more crucial to an agency's success. E-signatures eliminate the hassle of printing, signing, and scanning documents for streamlined delivery services and reduced delays that come with tracking forms manually. Adobe Sign will have you saving paper and tossing the pen to deliver fast, legal, and secure services through 100%...
Add Favorite
Cyber Insurance: Insider Tips to Ace Un...
Join BlackBerry and Carahsoft to learn how the preparations and choices you make before and during the underwriting process will lead to vastly different outcomes in the cost of your premiums. Stan Gatewood, a former Chief Information Security Officer will address this topic while receiving insider tips from Jeffrey Smith, Managing Partner at CyberRisk Underwriters. View this on-demand webinar to hear from two leading experts within the indust...
Add Favorite
Elevate Your Threat Hunting Program
The complexity of today's networks and the sheer amount of information being provided has made threat hunting a necessary part of every security program. Discover how ReversingLabs can enrich Splunk data with our industry leading threat intelligence. We will show you how to easily hunt for threats specifically targeted at your organization using our Splunk app which enables quicker malware identification and visualization. During this on-deman...
Add Favorite
Turning on the Light in Supply Chain Il...
In an ever-changing geopolitical landscape, understanding your global supply chain and finding inherent risks at speed and scale has never mattered more. View our on-demand webinar to gain an insider’s view on how to identify supply chain issues, quickly comprehend them, and accelerate mission-critical decisions. In our session, we share practical guidance to help you transform your Supply Chain Risk Management (SCRM) from theoretical to...
Add Favorite
AWS New York Virtual Innovation Day
AWS returned to New York! View this on-demand to see our second annual AWS New York Virtual Innovation Day. Complete with multiple sessions, this event focuses on the practical aspects of migration, end-user computing, and cost mitigation. Learn how the sophisticated, yet simple, AWS approach can help your agency thrive.
Add Favorite
Protect Your Controlled Unclassified In...
Classified Unclassified Information (CUI) is the path of least resistance for adversaries, and loss of aggregated CUI is one of the most significant risks to national security. Protecting your CUI is the most critical data protection topics for 2021. If your agency is only using encryption of data-at-rest (db) and encryption of data-in-transit (SSL); you are significantly exposed when your data is utilized and displayed within your apps. Your...
Add Favorite
Critical Infrastructure at Risk: Anatom...
An eagle-eyed technician at a water facility noticed that someone took over his computer and changed the amount of sodium hydroxide being added to the water. This attempt to poison the public's water supply with lye illustrates both the role of technology in the operation of critical infrastructure and the need for maintaining continuous vigilance to thwart cyber-attacks on industrial operations. View this on-demand webinar to gain insights in...
Add Favorite
Panel Discussion: Zero Trust and the Pe...
The seismic shift to distributed workforces has dissolved the Defense Department’s traditional network perimeter and put a focus on a new critical aspect of cybersecurity: identity management. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to never trust and always verify. In this new environment, a zero trust approach can help agencies minimize their attack surface...
Add Favorite
Back to Search Begin New Search