Back to Search Begin New Search Save Search Auto-Notify

View Full Calendar

On-Demand Webcasts

Past Events

Location + Refine Your Search

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

ICIT Fall Briefing: The Intersection of...
Agency personnel must navigate an ocean of vendor solutions, government mandates, and bureaucratic obstacles in their quest to support their agency mission and deliver services to citizens, business users, and warfighters. To succeed, we must focus not only on the technologies implemented but on how the leaders in our organizations are implementing programs, engaging stakeholders, and empowering teams to drive the outcomes desired. ​ Dur...
October 17, 2019
Organizer: Institute for Critical Infrastructure Technology
Location: Arlington, VA
Add Favorite
Three Critical Components for Effective...
Some of the most notorious and damaging security breaches happen in minutes. Did you know that they actually began months - if not years - in advance by the perpetrators? Advanced Persistent Threats (APTs) are considered to be the most dangerous and challenging to detect and defend because of the volume, variety, and velocity of data required to find them - as well as the amount of time and special attention required to catch them. Your advers...
October 17, 2019
Organizer: Cloudera Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
Why Advanced Application Threats Requir...
Join F5 for a Hands-On-Lab to hear about F5's Advanced Web Application Firewall (WAF), a new category of app protection that introduces unique capabilities to the WAF market. Web application attacks are the #1 source of data breaches. A WAF provides critical security controls to protect web apps. However, not all WAF solutions are made equally. While many can help an organization protect their apps from common and known threats, most are inade...
October 17, 2019
Organizer: F5 Networks Gov Team at Carahsoft Tech Corp
Location: Raleigh, NC
Add Favorite
Working with Mainframe and IBM i Data i...
Mainframes and IBM i systems continue to run many critical applications in the public sector; however, these systems are often left out of Splunk deployments because their data is complex and difficult to work with. A blind spot in your security and operational intelligence puts your organization at risk of failing an audit, or worse, so it's imperative to close this gap fast. Ironstream for Splunk helps eliminate this blind spot, by collectin...
October 17, 2019
Organizer: Syncsort Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
ICAM Modernization: Honoring Your Legac...
You are invited to join Okta, SailPoint, and Radiant Logic on the morning of October 22nd as we gather to learn from and engage with Identity Credentials and Access Management (ICAM) experts. We will discuss their best-in-class identity governance, access management and virtualization solution and how it is proven to facilitate digital transformation, providing agencies and organizations the convenience of unified access and single sign-on wit...
October 22, 2019
Organizer: Okta Gov Team at Carahsoft Tech Corp
Location: Washington, DC
Add Favorite
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
October 22, 2019
Organizer: F5 Networks Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
FireEye Demo Desk
In today's age where all of our most critical information is stored digitally, having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest TTPs (Techniques, Tactics, and Procedures), IOCs (Incidents of Compromise), and Zero-Day Attacks. This is where FireEye comes in... FireEye is on the fron...
October 23, 2019
Organizer: FireEye Gov Team at Carahsoft Tech Corp
Location: Webcast
Add Favorite
2019 CyberTalks
Presented by CyberScoop, DC CyberTalks is a TED-like conference dedicated to addressing cybersecurity priorities, trends, innovations, and the unprecedented security challenges ahead. For one day, 1,000 of the most influential cyber leaders from tech and government will gather in Washington, DC to hear the industry's brightest speakers discuss the most critical issues in cybersecurity.
October 24, 2019
Organizer: cyberscoop | fedscoop
Location: Washington, DC
Add Favorite
F5 Lab Day: Single Sign-on & Access Man...
Credentials are the keys to your networks, your applications, and increasingly the API backend of those applications. Join F5 Networks & Netsync for a hands-on lab where you will learn why preventing unauthorized access is critical to protecting your intellectual property and data. Understanding how apps enable user access -- and how apps can be compromised by attackers -- can help you streamline processes and meet user expectations, while...
October 24, 2019
Organizer: F5 Networks Gov Team at Carahsoft Tech Corp
Location: Edinburg, TX
Add Favorite
Demystifying Multi-Cloud in Government
According to Gartner, moving applications to the cloud is the most often mentioned game-changing technology for government CIOs today. OMB’s Cloud Smart guidance has reimagined the way agencies think about IT. This strategy encourages agencies to think of cloud as an array of solutions that offer management options to enhance mission and service delivery. This approach mirrors what commercial companies are doing to drive technology innov...
October 29, 2019
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Back to Search Begin New Search