Back to Search Begin New Search Save Search Auto-Notify
Ensuring Reliability: A Guide to Testin...
We understand that critical errors and broken dashboards can occur at any time, posing significant risks to your business operations, especially during migration or upgrade processes. Our expert-led session will provide you with practical strategies and techniques to mitigate these risks effectively. Join us as we delve into the crucial aspects of testing, certifying and building trust in your Tableau dashboards. During this webinar, attendee...
April 25, 2024
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
CTO Sessions: Quantum-Resistant Code Signing
Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant quantum computer. NSA’s CNSA 2.0 encourages vendors to adopt stateful HBS schemes as defined in SP 800-208 immediately for all software and firmware code signing, with a requirement to support them by 2025. SP 800-208 requires that all stateful HBS key generation and signature algorithms b...
April 25, 2024
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
UEM Innovation Update: How BlackBerry H...
Join BlackBerry and Carahsoft for a live webinar providing a fresh look at protecting federal networks and data with UEM updates and key differentiators. In this webinar, attendees will learn about BlackBerry’s upgrades to the UEM platform, including: Enhanced Security for Multiple Deployment Models (COPE, BYOD, etc.) Increased Productivity / UX for Daily Tasks with Microsoft Intune Integration Real-Time Mobile Threat Defense for All Sec...
April 30, 2024
Organizer: BlackBerry Government Team at Carahsoft
Location: Webcast
Add Favorite
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Automate, Analyze, Act: Streamlining Yo...
Join Elastic and the Arizona Department of Homeland Security (AZDOHS) to learn how their agency is leveraging Elastic to combat evolving threats. Elastic provides a centralized security information and event management (SIEM) platform and log aggregation, offering real-time visibility for improved cybersecurity and threat detection. With Elastic, organizations of all sizes can streamline log analysis, prioritize alerts based on threat relevanc...
April 30, 2024
Organizer: Elastic Government Team at Carahsoft
Location: Webcast
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
April 30 - May 2, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer: ISC2
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Atlassian User Academy: Jira Service Ma...
Unlock the potential of Jira Service Management in Atlassian's exclusive, half-day workshop! Optimize service delivery using ITSM best practices and harness the power of AI through Atlassian Intelligence. This course will dive into customer portal and agent functions among other powerful features that can help teams elevate service productivity and improve constituent satisfaction. Join our Atlassian expert on May 1st as they cover: Navigating...
May 1, 2024
Organizer: Atlassian Government Team at Carahsoft
Location: Webcast
Add Favorite
Connecting the Unexpected: Scalable Dat...
Driven by enterprise mission needs, organizations are attempting to address their end-state requirements with data relevant to the questions they need to answer. The scale and complexity of this data continue to create challenges for agencies, such as: which data is relevant to my problem set? What are we trying to answer with the data? And most importantly, how does this apply to my organization’s overall mission? Knowledge Graphs, wit...
May 2, 2024
Organizer: Certus Core Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search