Back to Search Begin New Search Save Search Auto-Notify
Web Series: Demystifying Cyber Threat H...
Traditional cybersecurity practices are failing to detect threats that exist in the gaps of networks and cyber teams. Cyber tools are only alerting us to what we know, but do not indicate new security risks unique to individual agencies. With threat hunting, security risks can be identified throughout the entire network revealing gaps in your agency's security that common cyber tools miss.Join CybernetIQ and Carahsoft for our web series to div...
Add Favorite
Keeper Defending U.S. Government Agencies
Cybersecurity starts with password security. 81% of all data breaches are due to weak password security. How can we prevent these breaches while quickly and cost-effectively closing the largest security gap in government agencies? The answer is with strong password policies, enforced by an easy-to-use, intuitive password security solution. Join Keeper for a webinar on March 24th to learn how to best protect your agency. During this webinar, Da...
Add Favorite
Securing Splunk: Balancing Big Data Ben...
Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching events after they occur, agencies should anticipate their occurrence and implement measures to limit vulnerabilities in real time. For that, agencies need an analytics-driven SIEM platform such as Splunk. However, once data is correlated by SEIM tools, it becomes extremely valuable. By integrating...
Add Favorite
Build a Strong Insider Threat Detection...
Insider threats are still a growing problem, despite increasing mindshare and budgets. The key to stopping these threats - and to strengthening the organization as a whole - is making data-driven decisions using visibility into data, machines, applications, and people. In this webcast, presented by Dtex Systems and Carahsoft, Dtex will share how they are helping to utilize data to build stronger business and security strategies. We will discus...
Add Favorite
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
CMMC: What You Need to Know and How to...
The U.S. Department of Defense (DoD) is now requiring all companies that do business with them to obtain the Cybersecurity Maturity Model Certification (CMMC). All 300,000 members of the Defense Industrial Base (DIB), which include suppliers of goods and services to DoD are looking for answers to questions they have regarding CMMC. This on-demand webcast will provide some much-needed answers to questions about what you need to do to get starte...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Splunk for CMMC Solution: A Deeper Dive
Join Splunk's, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations' journey to actively monitor and measure the performance of data-driven practices defined by CMMC. In this session, we'll dig into the following topics with demonstrations throughout on: Al...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Google Cloud 2020 Webinar Series: Augme...
Hints of a threat can come from anywhere, including places you weren't expecting. Join Google Cloud and Carahsoft to learn how to protect you and your organization from potential threats. The key to identifying a threat is to gather all of your data, be able to uniformly examine your threat events, and be capable of drilling down and pivoting with direct access to underlying data. Master how to properly apply machine learning and analytics tha...
Add Favorite
Back to Search Begin New Search