135 webcasts found
+ 96 past events found
Back to Search Begin New Search Save Search Auto-Notify
Securing K-12 Modern Learning Environme...
Join Palo Alto Networks' for a 3-part on demand webcast series that will explore the challenges of cybersecurity in K-12 education and explore the resources that are available to help prevent successful attacks. The digital evolution of K-12 education, which has been underway for some time now, continues to surge as schools and districts move forward in their quest to deploy new tactics. These include 1:1, bridging the homework gap, and empowe...
Add Favorite
Practical Advice for Implementing Zero-...
Data can be your most valuable asset or your biggest liability. Regardless of how it is stored or used, do you know who is supposed to have access to it or how they are accessing it? And how do you manage this risk? For example, according to a Ponemon Institute research report sponsored by Varonis, more than 62% of employees have access to data they should not. That's what Virtru seeks to address. Virtru believes you shouldn't have to choose b...
Add Favorite
Cipher Summit 2019
Save the date for our SafeNet AT 2019 Cipher Summit! Attendees will hear from their peers, industry pundits, and technology experts about the current federal cyber security landscape and learn about the solutions needed to help solve the most pressing security issues.This one-day event will also feature technical sessions designed to help SafeNet AT customers' better leverage their current solutions and provide a forum for interactive discussi...
Add Favorite
Google Cloud October Webinar Series: As...
Join Google Cloud and Carahsoft for a deep-dive webcast on VM Migration. We plan to walk you through what an assessment of your on-prem environment would look like, how we do the assessment, and the immediate value you get out of it. From there, we will go in-depth on some customer scenarios that have already gone down this path with us. We will discuss how those customers chose to first adopt the cloud, based on their business needs and chall...
Add Favorite
McAfee's New Capabilities for NIH Webinar
National Institutes of Health’s mission is to seek fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability. They have identified Cyber Security as a key, strategic initiative needed to protect the personal information of the customers they serve. NIH desires an industry-leading platform approach that offers scalability,...
Add Favorite
Improve Detection & Notification of Ran...
Do you have centralized visibility in your environment? Are you able to quickly detect and respond to advanced threats? Do you have the skill sets and resources to protect and remediate potential data breaches? Ransomware has hit government agencies hard across the country with an enormous increase in attacks from the previous year. Texas has not been immune to these threats either, as attackers continue to find new methods of exploiting vulne...
Add Favorite
Web Application Firewall (WAF) and DDoS...
Join F5 Networks and Carahsoft for a webinar where we will discuss how your organization can deploy managed security services for every application, anywhere, without upfront investments in IT infrastructure and support. With F5's fully-managed Web Application Firewall (WAF) and DDoS Protection services, you'll be protected against the 10 most common web application attacks, malicious bots that consume valuable resources, and DoS attacks.F5's...
Add Favorite
Dcode Virtual: Improving Cyber Posture...
The coronavirus outbreak emphasizes the need to bring the best emerging tech solutions into the government as adversaries have already shown that they are using this vulnerable time to attack the U.S. government. Join Dcode’s cyber expert Lauren Strayhorn to discuss these challenges and some of the best solutions to keep infrastructure secure, even while teleworking.
Add Favorite
Improve Your Compliance Posture with Id...
Many modern hybrid enterprises and government agencies are struggling to ensure they have security controls everywhere necessary as well as being able to prove their effectiveness, especially with so many shared privileged accounts. Ever-changing industry as well as government regulations make it difficult to get and stay compliant. In order to reassure customers and the public that confidential data such as credit cards and health records are...
Add Favorite
Hitting the Ground Running: Reviewing t...
In this webcast, CMMC Architects, Gavin Jurecko & Matt Trevors will provide insight on how to evaluate and assess your organization’s readiness for meeting the practice requirements of CMMC Level 1.
Add Favorite
Back to Search Begin New Search