Operationalizing Quantum-Ready Zero Tru...
US Federal agencies are facing a dual challenge: the urgent need to adopt Zero Trust while simultaneously preparing for quantum-safe future. Executive orders like EO 14306 and EO 14028 are putting the pressure on, requiring rapid PQC and ZT adoption. How can agencies effectively bridge the gap between these two critical initiatives and successfully meet the executive mandates? The answer lies in Cryptographic Posture Management. Carahsoft, Mar...
Strengthening Your Security Across Your...
Gigamon and Carahsoft hosted a demo desk, where we showcased how Gigamon empowers organizations to boost efficiency and strengthen security across physical and cloud environments. In this session, attendees discovered how powerful features like application intelligence can give them deeper visibility into their network and improve operational outcomes. During this complimentary demo, attendees learned:How to increase the security of all their...
Buying Software That Delivers: Strategi...
Attendees joined this expert-led webinar with Carahsoft and Clearwater for a behind-the-scenes look at the proven playbook for selecting and implementing enterprise software that delivers real, measurable value. They heard firsthand from those who’ve helped organizations across sectors cut through complexity, secure buy-in, and deploy solutions that drive lasting impact. During this webinar, attendees learned how to:Navigate procurement...
Mission FedRAMP High: Fast-Tracking Zer...
Federal agencies face unprecedented cybersecurity challenges driven by evolving threats, compliance pressures, and budget constraints. Agencies shouldn’t have to juggle extra solutions, contracts, or overhead just to comply with EO 14028, OMB M-22-09, and the DoD Zero-Trust Strategy. To navigate these complexities, agencies are turning to integrated solutions that streamline Privileged Access Management (PAM) and elevate compliance to Fe...
Mission Assurance is Software Assurance
Thank you for your interest in our mission-focused webinar on software assurance and secure delivery.The Department of Defense is doubling down on requirements for SBOM generation, ATO and SWFT, pushing teams to meet higher standards for securing mission-critical systems. Many legacy tools are falling short—offering limited automation, visibility and compliance support.During the webinar, cybersecurity leaders from ReversingLabs shared h...
SAP & BlackLine for Utilities: Deliveri...
Attendees heard from leaders at SAP, BlackLine, and Deloitte as they explored the Gold Standard for Record-to-Report (R2R), a best-practice blueprint designed to help Utilities finance and accounting teams navigate complexity, optimize performance, and prepare for the future.During this webinar, attendees learned:How SAP, BlackLine, and Deloitte are defining the Gold Standard for Record-to-Report (R2R) — a proven framework for Utilities...
Securing Tomorrow: The Critical Role of...
As adversaries increasingly exploit gaps in U.S. supply chains through covert capital, shell companies, and hidden ownership, vendor vetting has become a frontline defense—not just a compliance checkbox. Download this dynamic panel-style webinar featuring leading experts from Babel Street, Google Public Sector, and Minella Global Strategies to explore the evolving threat landscape and the urgent need for intelligence-driven vendor vettin...
An Introduction to Cloud Options for Fo...
Public sector organizations are under increasing pressure to modernize legacy systems, enhance service delivery, and meet evolving compliance standards, all while staying within budget constraints. Adobe Experience Manager (AEM) Forms offers flexible cloud deployment options that support digital transformation while maintaining the highest standards of security, scalability, and accessibility. Watch this on-demand webinar to explore how AEM Fo...
Why Intelligent Observability and Agent...
Organizations are under constant pressure to roll out new product features and enhancements to stay competitive. AI has emerged as a helpful tool, promising to boost productivity and streamline processes so organizations can focus on innovations that strengthen their core business, but many businesses are unsure of how to leverage AI effectively, let alone incorporate it into existing workflows. Intelligent observability (observability strengt...
Restoring Trust in Every Digital Interaction
During this webinar, we explored how to detect and prevent threats like synthetic identities, account takeovers and impersonation.Attendees were able to:Understand today’s evolving identity fraud landscape and its impact on public trustLearn how to integrate fraud detection, identity verification and adaptive authenticationDiscover best practices for reducing friction for employees and constituents alikeSee how Ping Identity helps state...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.