10 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
Migrating from a Legacy VPN to a ZTNA S...
Are you ready to revolutionize your network security strategy? Join us for our Migrating from a Legacy VPN to a ZTNA Solution webinar! Existing solutions based on virtual private networks (VPN) can’t keep pace with the scale of remote users and often lead complicated architectures and a poor end-user experience. Also threat actors know that VPNs are easily compromised – and give implicit access to the underlying network. New securi...
March 28, 2024
Organizer: Versa Networks Government Team at Carahsoft
Location: Webcast
Add Favorite
RSA Conference 2023
We couldn’t be more excited about the RSAC 2023 theme: Stronger Together. In the cybersecurity industry, no one goes it alone. Instead, we build on each other’s diverse knowledge to create the next breakthrough—exchanging ideas, sharing our success stories, and bravely examining our failures. RSA Conference 2023. Stronger Together. Now that we’ve nailed the theme, we are hard at work planning the agenda, building out th...
April 24-27, 2023
Organizer: RSA
Location: San Francisco, CA
Add Favorite
Presenting Accounting Information to No...
As an accountant presenting financial information to non-accountants, it's important to take the approach that some of the accounting jargon you typically use around your peers may not be as easily received by a non-accountant audience. Show non-accountants that you're more than a "bean counter", that you truly are a strategic partner in the business by tailoring your presentation in an easily digestible format. Present information that is rel...
May 18, 2021
Organizer: Left Brain Professionals Inc.
Location: Webcast
Add Favorite
Evolving Cybersecurity Needs of Telewor...
This year has proven the need to accelerate digital transformation and leverage the momentum of digital modernization. Digital modernization is driving change across Federal agencies in order to create a modern, secure, coordinated, transparent and cost-effective IT architecture that improves the cyber threat posture and transforms data into actionable information. With the acceleration of digital initiatives, an integrated approach to digital...
August 13, 2020
Organizer: ATARC
Location: Webcast
Add Favorite
Dell EMC & RSA Ransomware Government Briefing
How do you effectively defend your organization against something that's never been seen before? The key is to have secure endpoints and a trusted recovery process. Join us for a Government Briefing in Washington, DC that focuses on Dell EMC's Ransomware and Cyber Recovery and RSA Archer. Dell EMC's vendor-agnostic Ransomware and Cyber Recovery solution has advanced air-tight protection services to ensure that the "heartbeat" of your organizat...
June 7, 2018
Organizer: DellEMC Gov Team at Carahsoft Technology Corp.
Location: Washington, DC
Add Favorite
RSA Conference 2018
RSA Conference 2018 takes place April 16 to 20 in San Francisco! Information is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to stand against cyberthreats around the world. That means being here for you. Connecting you with the people and insights that will empower you to stay ahead of cyberthreats. We do this th...
April 16-20, 2018
Organizer: RSA Security
Location: San Francisco, CA
Add Favorite
Breach Notification in the GDPR Era
Most American organizations, and many organizations operating in certain member state jurisdictions in the EU, have been dealing with breach notification for years. It's pretty straightforward. Well, as straightforward as dealing with 50+ different breach notification laws can be. Now, however, with the EU's General Data Protection Regulation, there may be one breach notification law to rule them all. Its requirement for quick turnaround (72 h...
January 25, 2018
Organizer: RSA Conference
Location: Webcast
Add Favorite
Virtual Session: Top Privacy Issues for...
For decades, information security functions have fought for the responsibility to monitor the flow of information through the organization, in paper and digital formats, throughout its entire life cycle, and to determine the existence and accuracy of data classification. This effort has largely been successful. However, if all data flows through security’s filters, it is incumbent upon security professionals to implement the proper cont...
January 31, 2017
Organizer: RSA Conference
Location: Webcast
Add Favorite
Active Incident Response for Today's Ad...
It’s no secret that effective and timely incident response increases the chance of success in the face of sophisticated cyber attacks, when time is not on your side. This webcast will reveal how, with careful planning and the right resources in place, you can better detect and more quickly respond to a suspected security incident. Join this webcast and learn: The four key areas to focus on to be amply prepared for a major incident The d...
December 9, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Security Operation Center Management: T...
RSA Archer Security Operations Management (SecOps) enables enterprises to seamlessly orchestrate people, processes, and technology to effectively detect and respond to security incidents. Architected and designed by benchmarking world-class Security Operations Centers, our software solution is SOC process and persona focused. RSA Archer SecOps enables organizations to manage the overall incident response, breach response, and SOC program that...
May 19, 2015
Organizer: The RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Back to Search Begin New Search