Back to Search Begin New Search Save Search Auto-Notify
The Evolution of ATO and Workflows that...
Keeping in line with the Agile manifesto, Secure Development of software within the Government Tech community is improving as we gain direct experience through the process of its development. Secure Development Lifecycles, the addition of "Sec" to form DevSecOps and the molding of traditional Authority to Operate (ATO) to the application of modern continuous integration/continuous delivery operations has birthed a GovTech community pushing th...
March 28, 2024
Organizer: Security Compass Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Migrating from a Legacy VPN to a ZTNA S...
Are you ready to revolutionize your network security strategy? Join us for our Migrating from a Legacy VPN to a ZTNA Solution webinar! Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New securi...
March 28, 2024
Organizer: Versa Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
Enhancing Security Across Digital Docum...
PDFs are widely used for storing, sharing, and archiving documents, including highly classified or confidential information. Ensuring the security of these PDF documents is crucial to protect against unauthorized access, data breaches, and information leaks that can have severe consequences for national security, privacy, and the integrity of government operations. Adobe is empowering agencies to transform their manual document processes with...
March 27, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Resilience Unleased: The Case for Devel...
We invite you to meet Synack, the premier security testing platform that offers Penetration Testing as a Service (PTaas) on its FedRAMP Moderate Authorized Platform. Synack enables federal, state and local government customers to increase cyber resilience, allowing them to find their most critical vulnerabilities and track improvements over time. You are invited to our complementary Synack webinar, where you will learn about: The Case for Deve...
March 27, 2024
Organizer: Synack Government Team at Carahsoft
Location: Webcast
Add Favorite
Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
March 26, 2024
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Cloud Architecture Matters: Improve Clo...
As agencies increasingly migrate their workloads to the cloud, it is crucial to understand the implications and benefits of writing natively to the cloud, which enables organizations to optimize their data protection strategies, streamline operations, and enhance overall security. “Writing natively” is about building, deploying and managing software apps in the cloud computing environment. Taking this approach makes it possible to...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust: In Depth
Federal departments and agencies are making headway in meeting the requirements of Executive Order 14028, issued in May 2021, to strengthen their cybersecurity by implementing a zero trust architecture. To date, many agencies have made progress in areas like identity management and secure access. But the journey toward achieving a zero trust environment is different for every department. The challenges that civilian agencies must overcome are...
March 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Election Security: Protecting the Found...
It has become clear over the past several years that maintaining U.S. election integrity is not just a single agency’s responsibility. Conducting fair and accurate elections is the responsibility of each state and territory. Meanwhile, nation-states, partisans, and scammers can interfere with voter information, try to cast doubt on election outcomes, and spread disinformation across social media, to name just a few. The Office of the Dir...
March 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Modernizing OIG Operations Staying Comp...
Registration for this event is now closed Office of Inspector General (OIG) organizations are increasingly seeking modern, secure, cloud-based solutions to provide independent oversight and monitoring of agency audit cycles and event-driven inspections and investigations. Using a pre-built solution to accelerate this cloud journey helps deliver cost-effective custom applications with the speed and stability of commercial-off-the-shelf (COTS) p...
March 21, 2024
Organizer: Appian Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search