Back to Search Begin New Search Save Search Auto-Notify
Built for Government: How Embedded Endp...
Did you know that Absolute’s endpoint security solution is embedded directly into government-used device firmware, offering unique advantages for enhancing control, resilience and compliance? In this session, we’ll explore how agencies use Absolute to:Enforce robust security policiesDetect and recover from IT disruptionsStrengthen cyber resilience with persistent endpoint monitoring, automated repairs and geofencing for secure oper...
March 25, 2025
Organizer: Absolute Government Team at Carahsoft
Location: Webcast
Add Favorite
Building Accessible Dashboards
Join us for an insightful webinar on the art of creating accessible data visualizations. Learn key principles for designing dashboards that cater to a wide range of user needs, ensuring that everyone can see and understand data effectively. In addition to these best practices, we will take a tour of the latest and upcoming Tableau features on accessibility, highlighting the enhanced usability experiences. During this webinar, attendees will le...
March 25, 2025
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Join Us at Zscaler Public Sector Summit...
Get ready to take the next steps on your IT modernization journey embracing innovation. Hear from prominent government IT leaders and industry experts who will provide valuable use cases and actionable insights for each stage of the transformation journey—from initial assessments and strategy building to implementation and ongoing optimization. Don’t miss this opportunity to gain the knowledge and tools necessary to achieve better...
March 24-25, 2025
Organizer: Zscaler
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
March 17-21, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CGRC | Official ISC2 Training Week
CGRC | Official ISC2 Training Week 40 CPE’s Official ISC2 CGRC certification provides a comprehensive review of the knowledge required to effectively gain the expert knowledge, skills, and experience to manage risk and authorize and maintain information systems within various frameworks. Participants receive the following with registration: Official ISC2 CGRC Student Training Guide (eBook) 180-Day Access to Class Recordings Applied Scena...
March 17-21, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Spring Cyber Solutions Fest 2025: Attac...
Join us for the Attack Surface and Vulnerability Track at SANS Spring Cyber Solutions Fest 2025! This track focuses on understanding and mitigating vulnerabilities across your organization’s attack surface. Engage with industry experts as they discuss the latest techniques for identifying, assessing, and managing vulnerabilities. This one-day track will feature a variety of presentations, case studies, and practical insights tailored for...
March 20, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
Spring Cyber Solutions Fest 2025: Zero...
In an age where cyber threats are ever-evolving and organizational perimeters blur, the mantra of "Never Trust, Always Verify" has never been more crucial. Join us at the Spring Cyber Solutions Fest for the Zero Trust Track, where industry leaders will explore the latest advancements, technologies, and best practices in the Zero Trust paradigm. This track will gather top experts and vendors to help you navigate the complexities of implementing...
March 20, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
A Cloud-Based Approach for Software Sel...
Implementing a new system is not just about replacing old software; it's an opportunity for business transformation. This is the perfect time to reassess and optimize your business processes, look for ways to streamline operations, reduce redundancies, and enhance efficiency. When new software is not strongly aligned with your overall business strategy, the result is implementation confusion and lackluster results. Understanding the greater co...
March 20, 2025
Organizer: Avaap Government Team at Carahsoft
Location: Webcast
Add Favorite
Axonius Adapt 2025
Adapt to the Future of Cybersecurity - Get Ready to Take Action! This isn't your typical corporate event - it's where big ideas, bold strategies, and fun collide. Axonius Adapt is the must-attend conference for Security, IT, and Risk professionals collectively working towards a more resilient cyber future - where teams have full actionability over their distributed technology footprint, feel prepared for just about anything, and have time to w...
March 20, 2025
Organizer: Axonius
Location: Dallas, TX
Add Favorite
Beyond Breaches: Leveraging Compromised...
Join District 4 Labs, creators of Darkside, for a live demo showcasing how breached records and other datasets with compromised PII from the Deep and Dark Web can significantly enhance person of interest investigations. In this session, we will demonstrate the power of Darkside, one of the world’s largest repositories of comprised PII, by tracking down one of the FBI’s Ten Most Wanted Individuals. During this webinar, you will lear...
March 20, 2025
Organizer: OSINT Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search