Back to Search Begin New Search Save Search Auto-Notify
How to Prioritize Mission Delivery and...
Join us as thought leaders from government and industry discuss the evolution of Salesforce security threats, operational continuity requirements, Zero Trust security principles, and practical strategies for protecting data against targeted attacks and insider incidents. Learning Objectives Review the kinds of cyber threats facing Salesforce, such as expanding an agency’s external attack surface and unclear responsibilities in the event...
June 5, 2024
Organizer: Own Government Team at Carahsoft
Location: Webcast
Add Favorite
Generative AI for Customer Service: Suc...
A stunning stat from the Harvard Business Review for you to consider: 80% of AI projects have failed! The burning question today: How do you safely implement and unleash business value for CX and EX (employee experience) from Gen AI with a knowledge foundation? What are the lessons learned from early deployments? Register for this upcoming webinar, featuring domain experts from eGain to learn how to harness the combined power of Gen AI and Kn...
June 5, 2024
Organizer: eGain Government Team at Carahsoft
Location: Webcast
Add Favorite
Babel Street GEOINT Webinar
Join our upcoming webinar to learn how to ensure your geolocation data is up-to-snuff and empowers, not hinders, your analysis! Geolocation analysis offers a powerful tool for understanding spatial trends and patterns. However, the accuracy and reliability of derived insights fundamentally depend on the data quality. Rarely does the required data come off the shelf and ready for analysis without additional cleansing, enriching, and standardizi...
June 6, 2024
Organizer: Babel Street Government Team at Carahsoft
Location: Webcast
Add Favorite
Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
June 6, 2024
Organizer: ThreatLocker Government Team at Carahsoft
Location: Webcast
Add Favorite
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
June 6, 2024
Organizer: UberEther Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
From Silos to Synergy: Bringing Higher...
In the rapidly growing world of AI, organizations have a responsibility to modernize and secure their Data Solutions and trust their information is 100% reliable, auditable, and accessible. Eon Collective guides organizations to establish their sustainable solution to prepare for AI integration by leveraging standardized open-source methodologies to obtain a robust system of Business Intelligence. These methodologies align people, process, an...
June 6, 2024
Organizer: Collibra Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Sensitive SAP Data with Dyna...
The current regulatory compliance and cyber threat landscape is constantly shifting and coupled with digital transformation projects like S/4HANA migrations, protecting sensitive data within SAP systems is paramount. To secure sensitive SAP data effectively, organizations must implement data-centric security controls such as Dynamic Data Masking. Unfortunately, many organizations have a security gap when it comes to the data-layer of their SA...
June 6, 2024
Organizer: Pathlock Government Team at Carahsoft
Location: Webcast
Add Favorite
APEX, CMMC and Project Spectrum
Securing government contracts is becoming increasingly challenging due to stringent requirements such as FedRAMP and CMMC. If your clients aim to secure contracts with the DoD, join us for this timely web discussion, hosted by Cyturus, in collaboration with Carahsoft and The Cyber AB, exclusively for APEX Accelerator Consultants. This session aims to equip APEX Consultants with resources specifically designed for APEX consultants and their cli...
June 6, 2024
Organizer: Cyturus Technologies Government Team at Carahsoft
Location: Webcast
Add Favorite
Data Governance Demystified: From Chaos...
Embark on a journey to unravel the complexities of data governance with Tableau in our upcoming webinar. We'll uncover the pivotal role Tableau plays in establishing robust data governance frameworks that ensure data integrity, compliance and trustworthiness. During this webinar, attendees will learn: Defining data policies to implement governance controls Practical strategies and techniques to effectively govern a data landscape Tableau's po...
June 11, 2024
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search