Splunk Security Essentials: Now on DoD...
DoD has been growing year over year, investing in Splunk to support continuous monitoring, IT operations, and a number of other use cases. In February, Carahsoft signed a five-year ESI agreement with Splunk. The agreement is a DoD-wide BPA that allows customers to leverage Splunk. Join us as we discuss: How the contract has been structured The value it brings to DoD How to leverage the contract Splunk use cases SIEM capabilities Security Essen...
Live Webinar: Everything You Need to Kn...
Join Accellion and Carahsoft our upcoming webinar to learn what companies must do to achieve Level 3, what to expect from the audit process, how to apply your efforts in NIST 800-171 compliance to CMMC, and more. The Defense Industrial Base (DIB) has always been an exclusive club for government contractors and subcontractors. Once you get in, you enjoy a lucrative contract with the Department of Defense (DoD). Consider the new Cybersecurity Ma...
FireEye Demo Desk
In today's age where all of our most critical information is stored digitally, having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest TTPs (Techniques, Tactics, and Procedures), IOCs (Incidents of Compromise), and Zero-Day Attacks. This is where FireEye comes in... FireEye is on the fron...
FireEye Demo Desk - FireEye Overview
In today's age where all of our most critical information is stored digitally, having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest TTPs (Techniques, Tactics, and Procedures), IOCs (Incidents of Compromise), and Zero-Day Attacks. This is where FireEye comes in... FireEye is on the fron...
Stopping DNSpionage In Its Tracks: An A...
The international Domain Name System isn't just infrastructure. It works hand-in- hand with SSL/TLS-based authentication and encryption systems to provide a foundation of trust and privacy across the internet.Earlier this year, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency detected an ongoing threat to federal agencies and issued the Emergency Directive 19-01. The attacks compromised DNS records and cre...
FireEye BAI Threat Intel Breifing
Join us for this informative briefing to learn about: How attackers are targeting the Government The latest on cutting-edge cyber threat intelligence, automation of SOC operations, and the latest industry trends in cyber Incident Response New attack groups and the tools, tactics, and procedures they use against their victims, as well as campaigns they have been involved in Recommendations for improving security and steps to take today Appetiz...
The Hows and Whys of High Fidelity Bro/...
*Attend & receive 1 (ISC)2 CPE credit! Join Corelight and Carahsoft on May 1st for a presentation on how to leverage "Bro/Zeek" data during cyber investigations. The modern Security Operations Center (SOC) consumes an immense amount of data, however not all of it is useful during an investigation. In fact, the data often comes from a number of disparate sources with little to no correlation except time. This places a heavy burden on cybers...
F5 SPAWAR Charleston TechTalk
Hosting workloads in an off-premise Cloud Service Offering (CSO) is becoming more prevalent in DoD. Taking advantage of cloud computing efficiencies is necessary when trying to keep up with an agile application deployment approach to IT. When utilizing these cloud compute resources, applying access control, monitoring, security and visibility as we do to our on-premise workloads is paramount in protecting the Mission Owner's applications and...
Securing JIE/JRSS Alignment - Florida
Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner users. F5 improves a...
Securing JIE/JRSS Alignment - Alabama
Secure Your Resources, Simplify Authentication, and Consolidate Infrastructure in a Joint Environment - While Maintaining Command and Control of Your Applications Authentication, application security, remote access, and application portability (IPN, milCLOUD, CDC’s, public cloud) are challenges when preparing an environment to support consolidation, Joint Information Environment efforts, and coalition/mission partner users. F5 improves a...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.