Back to Search Begin New Search Save Search Auto-Notify
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
June 6, 2024
Organizer: UberEther Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Sensitive SAP Data with Dyna...
The current regulatory compliance and cyber threat landscape is constantly shifting and coupled with digital transformation projects like S/4HANA migrations, protecting sensitive data within SAP systems is paramount. To secure sensitive SAP data effectively, organizations must implement data-centric security controls such as Dynamic Data Masking. Unfortunately, many organizations have a security gap when it comes to the data-layer of their SA...
June 6, 2024
Organizer: Pathlock Government Team at Carahsoft
Location: Webcast
Add Favorite
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, aims to delve into the nuances of GAI, particularly focusing on its utilization by...
June 11, 2024
Organizer: Trend Micro Government Team at Carahsoft
Location: Webcast
Add Favorite
Tableau Server to Cloud: Lift & Shift v...
Is your on-premise Tableau Server hindering your data analysis capabilities? Tableau cloud beckons with faster analytics, scalability, security and simplified management, but migrating your entire Tableau environment can feel daunting. This upcoming webinar cuts through the confusion, unpacking the two main migration approaches viz: Lift & Shift and Tool-based migration. Come join Joseph Bernardo, Vice President of Data Value at USEReady,...
June 12, 2024
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Trellis Data's Secure Speech: Secure Tr...
In the age of AI, government agencies need an accurate, efficient, and flexible speech-to-text service customizable for specific use cases, languages, dialects, and environments while maintaining full data custody. Join us to discover Trellis Secure Speech's powerful user features including keyword searching, real-time alerts, dynamic speaker ID, language identification, and translation between multiple languages. Additionally, learn how Trel...
June 12, 2024
Organizer: Trellis Data Government Team at Carahsoft
Location: Webcast
Add Favorite
Fortress in the Cloud: Building Zero Trust
In today's increasingly complex cloud landscape, securing your environment requires a fundamental shift from traditional castle-and- moat defenses to a zero trust approach. This webinar, co-hosted by Palo Alto Networks and AWS, will guide you through the essential concepts of zero trust security and explore how Palo Alto Networks and AWS can empower you to achieve it. During this webinar, attendees will: Understand the core principles of zero...
June 13, 2024
Organizer: Palo Alto Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
June 18, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
5 Easy Wins to Achieving Zero Trust in...
Orca Security, in collaboration with GuidePoint Security invite you to this insightful webinar on June 18, 2024. Listen in as Neil Carpenter, Elizabeth Sims and Chris Romero delve into the challenges and solutions for achieving Zero Trust in the cloud. Hear insights revolving across the key pillars: Data Automation and Orchestration Governance Identities and Entitlements Application and Workload
June 18, 2024
Organizer: Orca Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search