135 webcasts found
+ 96 past events found
Back to Search Begin New Search Save Search Auto-Notify
TechNet Cyber Webinar Series: Demystify...
In this on-demand webinar, attendees learned: How to avoid pitfalls in your ZTA implementation Technical and non-technical ZTA aspects Key aspects of the ZTA data pillar
Add Favorite
Data Sovereignty and Secure Collaborati...
Thank you for your interest in our Carahsoft TechNet Cyber Webinar Series featuring Rocket.Chat! Attendees learned how Rocket.Chat solutions can defend and improve their agency's approach to cyber attacks. During the session, Rocket.Chat experts explored: How to enable modern collaboration without security compromises What to look for in a sovereign, secure, and self-managed communications platform Why government and related agencies use Rocke...
Add Favorite
Enhancing Cyber Security Operations Lev...
As skilled cyber labor resources become scarce, and target attack surfaces increase, XDR technology provides the ability to correlate email, endpoint, server, cloud, workload, and network sources for stronger detection and greater insight. A roadmap to consolidating siloed point solutions provides alert prioritization, automotes many security workflows, and decreases time to detection and remediation of threats. In this on-demand webinar, atte...
Add Favorite
Why Traditional EDR is Still Not Enough...
Attendees of this webinar heard how VMware Carbon Black XDR is the new baseline for serving up the security for organizations today for operational excellence and reducing cost liabilities. With XDR, organizations have been able to experience a number of proven benefits when measured against traditional endpoint security methods, including: Unique capabilities for identifying, prioritizing, and reducing risk Complete coverage: endpoints, work...
Add Favorite
Mastering DoDD 8140.03M: A Deeper Dive...
In this informative session, our experts guided you through the key aspects of the directive and helped you navigate the path to compliance. By attending this webinar, you learned about: Qualification Matrix Residential Qualifications Privileged User qualifications and tracking (including SAAR/DD2875 forms) Incorporate Proficiency Level Handling Contractors Register to view this on-demand recording.
Add Favorite
Scalable, Simple, and Secure Data Resilience
Public sector data and the sensitivity to protect the information they store make these organizations targets for increased ransomware attacks and other cyber threats while managing complex requirements with reduced budgets and resources. Cohesity relieves government and education IT staff by simplifying the management of data and apps. Unlock how to securely get a single and scalable web-scale platform for backup and recovery, files, objects,...
Add Favorite
Hunting the Next Big Cyber Threat: A Da...
Recorded Future is the world’s largest commercial collector of real-time threat intelligence, analyzing intelligence from around 1 million distinct sources on the open and dark web. Join Laura Taylor, a Solutions Engineer, as she discussed how Cyber Threat Intelligence (CTI) teams can use Recorded Future’s powerful analysis to hunt down the next big cyber threat. The on-demand webinar included an overview of: Recorded Future...
Add Favorite
Utilizing Cloud-based Resources: Effici...
Attendees joined CloudHesive, Amazon Web Services (AWS), and Carahsoft to hear how AWS and Cloudhesive can help to accelerate research through tailored technologies and solutions. Scott Friedman, Principal Technical Business Development Manager - AWS Research, AWS and Patrick Hannah, Chief Technology Officer, CloudHesive provided an overview of AWS' robust architecture and CloudHesive's suite of services that can help your organization meet Cy...
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
Mission First: Public Sector Podcast Series
Listen on-demand to episode three of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Hear from Elizabeth Cappello, Deputy Chief Information Officer (CIO) for the Department of Homeland Security (DHS), and Craig Bowman, Senior Director - Federal for VMware, who will discuss: Meaningful implementation of Artifical Intelligence (AI) in cybersecurity How to view open stand...
Add Favorite
Back to Search Begin New Search