120 webcasts found
+ 96 past events found
Back to Search Begin New Search Save Search Auto-Notify
Preventing Digital Identity Theft and Fraud
As the public embraces technology in their everyday lives, they want great digital experiences with the government. Local and state agencies are rapidly modernizing, but the transformation arrives with new opportunities for identity theft and fraud. However, with the right approach, agencies can deliver digital services effectively while mitigating risks. Modern identity technology makes it possible. View this on-demand webinar to explore toda...
Add Favorite
Adversary Emulation at Scale with Rebel...
Rebellion Defense and Carahsoft invited you to learn how your agency can deploy automated adversary emulation with Nova and uncover the security weaknesses that have the greatest real-world consequence for your mission. Experts discussed how you can: Leverage advanced automation to emulate adversary tactics, techniques, and procedures (TTPs) at scale. Gain a contextualized understanding of how cyber defenses truly stand against real-world atta...
Add Favorite
Ensure Cyber Threat Defense with Zero T...
You think you have your Zero Trust framework dialed in, but the unimaginable happens. Bad actors have penetrated your agency’s perimeter, network, and endpoint security solutions, leaving you with your last layer of defense - the data layer itself. Join Rubrik and Carahsoft for an on-demand webinar to fortify your defenses against cyber threats. Built to withstand pervasive cyber threats, Rubrik's Zero Trust data security ensures resilie...
Add Favorite
Security Programs that Thrive in Econom...
As the world braces for a possible recession, companies are already beginning to tighten their belts and restrict spending in security departments. Yet, if 2021 and the explosion of ransomware, new nation-state-sponsored security attacks, and the skyrocketing cyber insurance premiums taught us anything, it is that security programs must continue to improve in order to stand a chance at meeting today’s cybersecurity challenges. In this pr...
Add Favorite
Mission First: Public Sector Podcast Series
Listen to Mission First, VMware and Carahsoft's Public Sector podcast series focusing on the mission, not the products. Hear season two, episode one of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Attendees heard from Mike Dent, Chief Information Cyber Security and Privacy Officer for Fairfax County Government and Craig Bowman, Senior Director - Federal at VMware, d...
Add Favorite
Oracle Cybersecurity Webinar Series
What does cybersecurity encompass? This can range from various pieces that comprise the overarching thought of cybersecurity. Oracle's portfolio of solutions provide assistance to federal customers with efficiency and security. Ransomware is one of the highest risks for any data-driven organization. Besides reducing the chances of an attack, agencies also need to evaluate data compromise and extraction, as well as post-attack recovery. This se...
Add Favorite
CrowdStrike Customer Story - Maine 207
In 2021 there was an 82% increase in ransomware-related data leaks and over 170 adversary groups being tracked for their cyber activity. Every organization is at risk, and due to the data-rich environment, K-12 school districts are considered high-value mines for ransomware groups. Our K-12 meeting featured Don Ringelestein from Maine Township High School District 207, as he explained what to look for in your cybersecurity solution journey and...
Add Favorite
Inside the New Mobile Mandates: Your Bl...
The new cybersecurity targets based on the Executive Orders, OMB Memos and CISA Directives all lead to a requirement for mobile devices to be tracked as endpoints, and mobile applications to be security tested for protection against malicious coding, geotracking, PII/PHI misuse, and government data loss. Whether you are managing existing mobile apps or building your own, the new cybersecurity directives are elevating the need to obtain a Conti...
Add Favorite
Safeguard M365 Data from Cyber Attacks
Attendees of this webinar explored M365 data defense strategies including: Rubrik tools that cyber-proof M365 data Rapid recovery at scale How to achieve air-gapped, immutable data resilience Register to view this on-demand recording.
Add Favorite
Zero Trust - Beyond the Buzzword
Thank you for attending our Zero Trust - Beyond the Buzzword webinar! During this webinar, you learned: What is Zero Trust and how it applies to data security How digital transformation can make data vulnerable but also more secure. Tips for putting Zero Trust Architecture into action. How does cloud make implementing Zero Trust faster but more complicated How to develop a long-term strategy to protect data throughout its entire life-cycle Re...
Add Favorite
Back to Search Begin New Search