Back to Search Begin New Search Save Search Auto-Notify
It's Not the Breach. It's the Spread: I...
This session explored the critical role of cyber resiliency in helping organizations withstand and recover from today's evolving threats. We dove into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets – while also examining how compliance regulations can enhance security and safeguard sensitive data. During this webinar, attendees:Gain actionable insights to strengthen their security postureLe...
Add Favorite
Effortless Content Creation with Integr...
Need to create professional graphics without a steep learning curve? Whatever you’re designing, Adobe Express makes content creation fast, easy, and on-brand—perfect for communications, outreach, and public engagement. Watch our on-demand webinar to discover how Adobe Express empowers government teams with intuitive design tools, automation, and built-in brand controls—all in a browser-based platform that works anywhere. In t...
Add Favorite
AI & Automation in Action: Modernizing...
Artificial intelligence (AI)-enabled software automation significantly enhances the operations and management of critical systems essential to national security, law enforcement and data analysis within the Department of Homeland Security (DHS) and the Department of Justice (DOJ). Red Hat OpenShift AI and Red Hat Device Edge, combined with Dynatrace’s observability tools, provide robust solutions for and drive automation within these sys...
Add Favorite
Respond Faster, Resolve More with Jira...
Government IT teams are being asked to do more with less while delivering faster, compliant services without disruption. The right ITSM approach can make all the difference. In this session, attendees learned how to:Understand CMDB fundamentals to improve visibilityOptimize incident response for faster resolutionDrive compliance without slowing your teams down
Add Favorite
Zero Trust in Action: Securing Identity...
In today’s hybrid, cloud-first world, identity and data have became the new security perimeter. Applying a Zero Trust model was essential to protecting these assets and ensuring operational resilience. This on-demand webinar featured Microsoft experts sharing practical strategies for implementing Zero Trust using Microsoft Entra ID and Microsoft Purview. During the webinar, attendees:Prevent unauthorized access and protect user identitie...
Add Favorite
Learn How to Achieve CMMC Compliance wh...
Ariento was a leading provider of managed, consulting, and advisory services to the defense industrial base related to the Cybersecurity Maturity Model Certification (CMMC). While not required, CMMC Level 2 certification demonstrated their commitment to their managed service clients and assisted in making their certification assessments easier and more cost effective. On Tuesday, October 21 from 1:00 – 1:30 pm, BeyondTrust’s Kevin...
Add Favorite
Escape Rising Virtualization Costs with...
Rising licensing costs and restrictive bundling models have left many government customers paying more than ever for virtualization solutions—often for features they didn’t even use. These unexpected expenses created budget challenges and limited flexibility at a time when agencies were under pressure to modernize efficiently. With HPE VM Essentials (VME), attendees discovered a smarter way forward. This solution delivered the agil...
Add Favorite
CMMC Better Together Webinar Series: Sh...
Carahsoft and our partners came together to host our 2025 CMMC “Better Together” Webinar Series: Shared Responsibility for Sustainable Compliance. The goal of this series was to bring together leading integrated solutions providers to explore how collaborative, end-to-end strategies can help members of the U.S. Defense Industrial Base (DIB) achieve and sustain compliance with the Department of Defense’s Cybersecurity Maturity...
Add Favorite
Journey to Success: Education Cloud in...
Aleysian and Carahsoft hosted a live webinar demonstrating how Salesforce Education Cloud unifies the entire student lifecycle within a single, integrated platform.The session showcased how institutions’ workflows could be improved with:A Unified Student ProfileThe Learner LifecycleA future-proof solution for scalabilityData and insights for more informed decisionsProactive student engagementAgentforce
Add Favorite
Vulnerability Management 101
During this on-demand webinar attendees learned:The importance of basic cybersecurity hygiene. The intersection of vulnerability management and MITRE ATT&CKHow vulnerability management plays a role with various standards and frameworks
Add Favorite
Back to Search Begin New Search