Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
Adversary Emulation at Scale with Rebel...
Rebellion Defense and Carahsoft invited you to learn how your agency can deploy automated adversary emulation with Nova and uncover the security weaknesses that have the greatest real-world consequence for your mission. Experts discussed how you can: Leverage advanced automation to emulate adversary tactics, techniques, and procedures (TTPs) at scale. Gain a contextualized understanding of how cyber defenses truly stand against real-world atta...
Ensure Cyber Threat Defense with Zero T...
You think you have your Zero Trust framework dialed in, but the unimaginable happens. Bad actors have penetrated your agency’s perimeter, network, and endpoint security solutions, leaving you with your last layer of defense - the data layer itself. Join Rubrik and Carahsoft for an on-demand webinar to fortify your defenses against cyber threats. Built to withstand pervasive cyber threats, Rubrik's Zero Trust data security ensures resilie...
Security Programs that Thrive in Econom...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this pr...
Mission First: Public Sector Podcast Series
Listen to Mission First, VMware and Carahsoft's Public Sector podcast series focusing on the mission, not the products. Hear season two, episode one of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Attendees heard from Mike Dent, Chief Information Cyber Security and Privacy Officer for Fairfax County Government and Craig Bowman, Senior Director - Federal at VMware, d...
Oracle Cybersecurity Webinar Series
What does cybersecurity encompass? This can range from various pieces that comprise the overarching thought of cybersecurity. Oracle's portfolio of solutions provide assistance to federal customers with efficiency and security. Ransomware is one of the highest risks for any data-driven organization. Besides reducing the chances of an attack, agencies also need to evaluate data compromise and extraction, as well as post-attack recovery. This se...
CrowdStrike Customer Story - Maine 207
In 2021 there was an 82% increase in ransomware-related data leaks and over 170 adversary groups being tracked for their cyber activity. Every organization is at risk, and due to the data-rich environment, K-12 school districts are considered high-value mines for ransomware groups. Our K-12 meeting featured Don Ringelestein from Maine Township High School District 207, as he explained what to look for in your cybersecurity solution journey and...
Inside the New Mobile Mandates: Your Bl...
The new cybersecurity targets based on the Executive Orders, OMB Memos and CISA Directives all lead to a requirement for mobile devices to be tracked as endpoints, and mobile applications to be security tested for protection against malicious coding, geotracking, PII/PHI misuse, and government data loss. Whether you are managing existing mobile apps or building your own, the new cybersecurity directives are elevating the need to obtain a Conti...
Safeguard M365 Data from Cyber Attacks
Attendees of this webinar explored M365 data defense strategies including: Rubrik tools that cyber-proof M365 data Rapid recovery at scale How to achieve air-gapped, immutable data resilience Register to view this on-demand recording.
Zero Trust - Beyond the Buzzword
Thank you for attending our Zero Trust - Beyond the Buzzword webinar! During this webinar, you learned: What is Zero Trust and how it applies to data security How digital transformation can make data vulnerable but also more secure. Tips for putting Zero Trust Architecture into action. How does cloud make implementing Zero Trust faster but more complicated How to develop a long-term strategy to protect data throughout its entire life-cycle Re...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.