Back to Search Begin New Search Save Search Auto-Notify
Enabling Resilience & Mobility for the...
As ransomware threats and cyber-attacks in the public sector continue to grow in frequency, severity and sophistication, the solutions used to combat it also need to adapt and improve to meet the needs of organizations. Zerto, a Hewlett Packard Enterprise company, helps state and local entities protect, recover and move their data and applications for continuous availability across on-premises, hybrid and multi-cloud environments. Zerto...
March 19, 2024
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
Building a CMMC Compliant Cyber Program...
Join Cytellix, Carbon Black and Carahsoft on March 13 for a panel discussion where we will touch on the following topics: CMMC audits are set to start Q1 2025 - are you prepared? Is there a “fast pass” model to help get ready for audit? Are there any tools or technology that can serve as an alternative to traditional consulting services?
March 13, 2024
Organizer: Cytellix Government Team at Carahsoft
Location: Webcast
Add Favorite
Safeguarding Student Data - Zerto for R...
Zerto is one simple, scalable platform for backup, disaster recovery, and cloud mobility. Zerto helps customers protect, recover, and move their data and applications for continuous availability across on-premises, hybrid, and multi-cloud environments. Zerto’s software only solution is ideal for these use cases: Ransomware Resilience, Disaster Recovery and Multi-Cloud Mobility. Acquired by HPE in 2021, Zerto expands HPE GreenLake and co...
March 12, 2024
Organizer: HPE Government Team at Carahsoft
Location: Webcast
Add Favorite
Climbing the Mountain: A New Era for Go...
In an era where cyber threats are increasingly sophisticated, the need for robust cybersecurity strategies in government IT departments is more pressing than ever. These threats are continuously evolving, leveraging new technologies and exploiting vulnerabilities in innovative ways. As a result, there is an urgent need for IT sectors to adapt and enhance their cybersecurity strategies. This adaptation isn’t just about implementing new te...
March 7, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Ransomware Detection and Response Virtu...
Become a black belt in ransomware detection and response and get a blueprint to build your organization’s cyber resilience at a Trellix virtual workshop.Cyber experts will help you identify gaps in your current architecture and put together an action plan that helps you take back control and defend against ransomware. Join experts and your peers for an interactive workshop. Map out a plan of action in your personal workbook Take part in...
March 5, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Rise of the Machines! Zero Trust Consid...
In today’s world, we’re constantly hearing about new tech terms and breakthroughs, from artificial intelligence (AI) to Zero Trust security. Government organizations are always trying to keep up, looking for quicker and smarter ways to get things done and keep their information safe. AI has been a big help, making tasks faster to complete than ever before. But, this progress comes with its own set of questions. What are the downsid...
February 22, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Zero Trust: Transforming CybersecurityÂ...
Zero Trust (ZT) potentially transforms DoD Cybersecurity. ZT is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. As the DOD explains in its roadmap, “there is one destination (zero trust) with many paths.” To that end, DOD’s Zero Trust strategy details 45 capabilities that support target lev...
February 15, 2024
Organizer: Defense Acquisition University
Location: Webcast
Add Favorite
CyberSmart 2024: Facing a Rapidly Chang...
Cybersecurity has always contended with evolving threats. As the internet has become more embedded into social and economic life and smart phones, tablets and other handheld devices become ubiquitous, bad actors have devised new attacks to capitalize on new vulnerabilities. And just as agencies are implementing zero trust architecture to help with this wave, other IT developments are threatening to upend cybersecurity even more. For instance,...
February 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
The Identity Catalyst: Accelerating Zer...
A decade ago, the Continuous Diagnostics and Mitigation (CDM) Program put agencies on the right path with critical investments in identity and access automation, but technology hasn’t stood still. Today, the Federal Zero Trust Strategy aims to accelerate cyber maturity throughout the government and secure our nation’s future. At the same time, relentless innovation in Artificial Intelligence is changing the game for attackers and d...
February 8, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Identity Based Access for Warfighter Cy...
Zero Trust is a cutting-edge cybersecurity method gaining ground, especially in defense and government agencies like the Defense Information Systems Agency (DISA). Adopting a Zero Trust model revolves around the continuous verification and monitoring of all devices and users trying to access any network, ensuring cyber resiliency and robust security measures for secrets management, encryption, access control and auditing in warfighter operatio...
February 6, 2024
Organizer: HashiCorp Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search