Back to Search Begin New Search Save Search Auto-Notify
Ensuring Reliability: A Guide to Testin...
We understand that critical errors and broken dashboards can occur at any time, posing significant risks to your business operations, especially during migration or upgrade processes. Our expert-led session will provide you with practical strategies and techniques to mitigate these risks effectively. Join us as we delve into the crucial aspects of testing, certifying and building trust in your Tableau dashboards. During this webinar, attendee...
April 25, 2024
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
NIST CSF 2.0 - A Playbook for Supply Ch...
Digital supply chains are complex and critical systems. In a rapidly evolving cyber landscape, supply chain security remains a top concern for organizations looking to solidify their protection strategies. Many organizations look to NIST for direction when setting their cybersecurity strategy. The new version of the Cybersecurity Framework (CSF 2.0) has recently been released and provides best practices to help navigate the evolving threat lan...
April 25, 2024
Organizer: Eclypsium Government Team at Carahsoft
Location: Webcast
Add Favorite
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
April 25, 2024
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
UEM Innovation Update: How BlackBerry H...
Join BlackBerry and Carahsoft for a live webinar providing a fresh look at protecting federal networks and data with UEM updates and key differentiators. In this webinar, attendees will learn about BlackBerry’s upgrades to the UEM platform, including: Enhanced Security for Multiple Deployment Models (COPE, BYOD, etc.) Increased Productivity / UX for Daily Tasks with Microsoft Intune Integration Real-Time Mobile Threat Defense for All Sec...
April 30, 2024
Organizer: BlackBerry Government Team at Carahsoft
Location: Webcast
Add Favorite
Seizing the Right Evidence, Anywhere
State and Local law enforcement officers often encounter unique challenges when collecting digital evidence. This webinar focuses on navigating unconventional crime scenes, from **inside a suspect's home** to remote locations like woods or parking lots. Register now to join ADF as they delve into critical considerations for State and Local agencies. Specifically, you will learn how to: Effectively secure digital evidence in diverse environment...
April 30, 2024
Organizer: ADF Solutions Government Team at Carahsoft
Location: Webcast
Add Favorite
AO Perspectives: Managing Risks and Str...
Picture this: you're on the brink of securing that crucial ATO approval, but the path is fraught with pitfalls—complex regulations, potential human errors, and the constant specter of cyber threats lurking in the shadows. As an Authorized Official (AO), you're all too familiar with the uphill battle of navigating the complexities and risks of the ATO package approval process while maintaining the resilience of your organization's defense...
May 2, 2024
Organizer: RegScale Government Team at Carahsoft
Location: Webcast
Add Favorite
Quantum Readiness: Effective Strategies...
Quantum Computers pose an existential threat to data encryption. In addition, adversaries are already capturing sensitive network traffic for Store Now, Decrypt Later (SNDL) attacks. For this reason, the Quantum Computing Cybersecurity Preparedness Act (H.R. 7535) requires federal agencies to prepare now to protect National Security Systems. Specifically, government agencies must maintain an inventory of all information technology in use that...
May 2, 2024
Organizer: Harpoon Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Connecting the Unexpected: Scalable Dat...
Driven by enterprise mission needs, organizations are attempting to address their end-state requirements with data relevant to the questions they need to answer. The scale and complexity of this data continue to create challenges for agencies, such as: which data is relevant to my problem set? What are we trying to answer with the data? And most importantly, how does this apply to my organization’s overall mission? Knowledge Graphs, wit...
May 2, 2024
Organizer: Certus Core Government Team at Carahsoft
Location: Webcast
Add Favorite
Reduce Risk, Enhance Response: Ransomwa...
Every year, ransomware continues to be a persistent and evolving threat in the realm of cybersecurity. As technology advances, ransomware adapts, making it essential for state and local government to stay vigilant and implement robust security measures. The impacts of ransomware extend beyond financial losses, encompassing data breaches, reputational damage, and operational disruptions. Defending your agency against these threats requires pro...
May 2, 2024
Organizer: Forescout Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search