Back to Search Begin New Search Save Search Auto-Notify
Trends in Information Sharing: AI Impac...
Trends in Information Sharing: AI Impacts on Regulatory Compliance and Best Practices The continuing evolution and use of artificial intelligence is reshaping compliance frameworks, necessitating more efficient and secure information sharing practices across industries worldwide. Join us as we explore the transformative effects of AI on the regulatory landscape and best practices concerning the protection and sharing of various types of sensit...
June 4, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Introduction to F5 BIG-IP Next
Due to high demand and a limited number of spots, this event has reached capacity. Join F5 for this virtual lab and get your hands on the Next generation of BIG-IP software! In this hands-on lab, you will learn: How to manage BIG-IP Next data plane nodes using the Central Manager GUI How to deploy and operate applications What a classic BIG-IP migration to Next entails How to protect applications using security policy HA and Next data plane up...
June 5, 2024
Organizer: F5 Government Team at Carahsoft
Location: Webcast
Add Favorite
Empowering Virtual Training in Governme...
In today's digital landscape, government agencies are increasingly turning to virtual platforms for training, education, and seminars. This transition requires sophisticated tools and strategies to ensure seamless and effective experiences. As technology reshapes how government agencies like the Department of Commerce (DOC) and its sub-agencies approach these initiatives, it's crucial to stay updated with best practices and emerging trends. Jo...
June 5, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Tidelift is Hosting Upstream: A One Day...
Upstream 2024, hosted by Tidelift, is set to tackle the persistent challenges of improving the health and security of open source software through a virtual symposium focused on pioneering technologies and unconventional solutions. Tune in on June 5 to take part in innovative discourse, connecting thought leaders, open source maintainers and visionaries from diverse fields. By attending this virtual event, you can expect to: Learn emerging and...
June 5, 2024
Organizer: Tidelift Government Team at Carahsoft
Location: Webcast
Add Favorite
Splunk Attack Analyzer Webinar
Join us for a webinar with Splunk to learn how Splunk Attack Analyzer can help you. Splunk Attack Analyzer automates the analysis of suspected malware and credential phishing threats. Unlike other analysis tools that require cumbersome manual workflows, the solution automatically follows and analyzes each step in complex attack chains to get to the final payload. Splunk Attack Analyzer renders a verdict and extracts forensics to provide analys...
June 5, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Babel Street GEOINT Webinar
Join our upcoming webinar to learn how to ensure your geolocation data is up-to-snuff and empowers, not hinders, your analysis! Geolocation analysis offers a powerful tool for understanding spatial trends and patterns. However, the accuracy and reliability of derived insights fundamentally depend on the data quality. Rarely does the required data come off the shelf and ready for analysis without additional cleansing, enriching, and standardizi...
June 6, 2024
Organizer: Babel Street Government Team at Carahsoft
Location: Webcast
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
June 6, 2024
Organizer: ThreatLocker Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search