Back to Search Begin New Search Save Search Auto-Notify
Official (ISC)2 CISSP OnDemand | Certif...
The Official (ISC)² CISSP OnDemand is a self-paced learning solution that covers the 6 domains of the CISSP Common Body of Knowledge (CBK) in order to study for the CCSP examination. Delivered in a modular format, including 28.5 hours of HD video content accessible via any web-enabled device at any time- as often as you want. This CISSP OnDemand allows students to learn at their own pace, spend extra time on material where needed and rei...
Add Favorite
CMMC: What You Need to Know and How to...
The U.S. Department of Defense (DoD) is now requiring all companies that do business with them to obtain the Cybersecurity Maturity Model Certification (CMMC). All 300,000 members of the Defense Industrial Base (DIB), which include suppliers of goods and services to DoD are looking for answers to questions they have regarding CMMC. This on-demand webcast will provide some much-needed answers to questions about what you need to do to get starte...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Splunk for CMMC Solution: A Deeper Dive
Join Splunk's, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations' journey to actively monitor and measure the performance of data-driven practices defined by CMMC. In this session, we'll dig into the following topics with demonstrations throughout on: Al...
Add Favorite
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Google Cloud 2020 Webinar Series: Augme...
Hints of a threat can come from anywhere, including places you weren't expecting. Join Google Cloud and Carahsoft to learn how to protect you and your organization from potential threats. The key to identifying a threat is to gather all of your data, be able to uniformly examine your threat events, and be capable of drilling down and pivoting with direct access to underlying data. Master how to properly apply machine learning and analytics tha...
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
New DHS CISA TIC 3.0 Guidance Makes Clo...
Effective immediately, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) issued new TIC 3.0 guidance allowing agencies to roll out zero trust direct-to-cloud connections through cloud service providers (CSPs) that meet CISA guidelines. This new guidance helps agencies avoid the challenges of VPN, which include infrastructure exposure and highly latent traffic paths due to traffic being forced to tr...
Add Favorite
Google Cloud Webinar Series: Augment Em...
Please join Google Cloud and Carahsoft for a webinar to demonstrate capabilities both within G Suite and Google Cloud Platform to detect, identify, and remediate end-user security events. Learn how public sector entities can respond to successful phishing attacks that impact other assets on the network, and take Google's approach in isolating the attack vector. During this webinar, you will learn about: End-to-end incident management, from end...
Add Favorite
Security Awareness Training Webinar
With the rise of remote working, agencies are more vulnerable than ever before. Since over 90% of attacks originate from emails and countless breaches are caused by human error, it's crucial to engage your end-users and create a culture of security awareness. Proofpoint's people-centric approach to security will transform your end-users from risky to ready, creating a formidable last line of defense against phishing and ransomware attacks. We'...
Add Favorite
Back to Search Begin New Search