Back to Search Begin New Search Save Search Auto-Notify
Tableau Enablement Series Part 5: Secur...
In today's data-driven landscape, ensuring the security of your analytics environment is paramount. Join our webinar to enhance your Tableau security expertise and explore how cybersecurity principles intersect with Tableau's features to ensure secure data access for your users. During this webinar, attendees will learn how to: Step up your Tableau security game: Learn how to leverage Tableau's built-in features to secure your analytics envir...
May 23, 2024
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
AI and State-Sponsored Espionage - A We...
Join Google Cloud, Mandiant, and GuidePoint Security for panel discussions focused on the dangers of state-sponsored cyber espionage and how Artificial Intelligence (AI) is rapidly changing the world and, with it, the landscape of cyber threats. AI is being utilized by both attackers and defenders, with the adversarial use of AI posing a growing concern. Recent trends indicate that cyber espionage is on the rise, and the employment of AI by th...
May 30, 2024
Organizer: Google Cloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Trends in Information Sharing: AI Impac...
Trends in Information Sharing: AI Impacts on Regulatory Compliance and Best Practices The continuing evolution and use of artificial intelligence is reshaping compliance frameworks, necessitating more efficient and secure information sharing practices across industries worldwide. Join us as we explore the transformative effects of AI on the regulatory landscape and best practices concerning the protection and sharing of various types of sensit...
June 4, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
June 6, 2024
Organizer: ThreatLocker Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Adapting to Change: Zero Trust Integrat...
In the realm of federal cybersecurity, Zero Trust principles are essential for resilience. This panel discussion delves into the intricacies of integrating ZT principles into established architectures, fostering a culture of trustworthiness and resilience at the agency level. Insights will be shared on navigating implementation processes such as FedRAMP compliance, Software as a Service (SaaS) adoption, and other complexities inherent in the t...
June 6, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, aims to delve into the nuances of GAI, particularly focusing on its utilization by...
June 11, 2024
Organizer: Trend Micro Government Team at Carahsoft
Location: Webcast
Add Favorite
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event will showcase an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats....
June 12, 2024
Organizer: SpyCloud Government Team at Carahsoft
Location: Webcast
Add Favorite
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. We invite you to join our webinar as we explore the intricate and powerful combination of Zero Trust and insider risk management! During this session, our speakers will: I...
June 12, 2024
Organizer: DTEX Sytems Government Team at Carahsoft
Location: Webcast
Add Favorite
How AI is Revolutionizing Government Co...
Regscale and Carahsoft are excited to invite you to join us in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. As the landscape of government regulatory compliance evolves at an unprecedented pace, navigating the labyrinth of regulations while maintaining operational efficiencies has become increasingly daunting. Staying ahead o...
June 18, 2024
Organizer: RegScale Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search