Back to Search Begin New Search Save Search Auto-Notify
Fighting Cyber Threats with FireEye
Cyber attacks have changed dramatically. Ill-equipped with outdated defenses, government networks are routinely infiltrated by cybercriminals through blended attacks that exploit unknown vulnerabilities and steal valuable data - or worse. Many government and education organizations lack the resources, manpower, and visibility to effectively detect and combat today's advanced persistent threats. Please join FireEye and Carahsoft to learn how th...
February 24, 2015
Organizer: FireEye Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Vulnerabilities of LTE
Long Term Evolution (LTE) is the dominant fourth-generation cellular technology. This commercial technology is also under consideration for defense applications where security, reliability, and interoperability issues need to be addressed. This webinar offers a glimpse of vulnerabilities and challenges of LTE. A brief overview of LTE is given. Air interface challenges such as jamming and interference vulnerabilities are described as well as in...
February 19, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
LTE - Ready for Critical Communication?
The worldwide success of UMTS Long Term Evolution (LTE) as THE wireless communication standard for mobile broadband data and High Definition (HD) voice delivery, including video, in today’s commercial communication networks has led to a commitment by governmental authorities to select LTE as underlying technology also for the next generation public safety network. In the United States, the Federal Communication Commission (FCC) has reser...
February 12, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
RSA Live Webcast: The Economic Impact o...
RSA Live Webcast: The Economic Impact of Mobile Cybercrime - Learn How Your Business Is At Risk in 2015 Mobile has changed the way companies interact, retain and monetize customers. Financial institutions and merchants have bolstered their mobile presence with apps and mobile-friendly websites to improve the customer experience and increase revenue. But all too often, security is left as an afterthought, opening up unparalleled enterprise risk...
February 12, 2015
Organizer: EMC
Location: Webcast
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
Access Policy Management
In your education environment, IT challenges arise everyday with student access, staff mobility, access to internal administrative resources, external applications and services. These ever growing demands place strains on staff and budgets as solutions are developed to meet them. Ease of use, speed of deployment, central policy enforcement and system-wide visibility are critical to managing these dynamic environments and the success of your s...
December 16, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Federal News Radio Online Chat: Ask the...
Dr. Doug Maughan, cybersecurity division director at the Department of Homeland Security's Science and Technology Directorate, joins Federal News Radio for a free online chat. DATE: Dec. 10TIME: 11-11:30 a.m. (EST) Maughan will discuss the agency's upcoming research and development showcase featuring 60 different cybersecurity technologies in Washington, D.C., as well as S&T's focus for 2015 around commercialization of cyber technologies,...
December 10, 2014
Organizer: Federal News Radio 1500 AM
Location: Webcast
Add Favorite
How to Develop Military-Grade Cybersecurity
Cybercrime has transformed into a sophisticated, billion-dollar industry, and high-risk targets need to develop a security posture that can scale to the volume and maturity of cyber-attacks being carried out against enterprise organizations. Join this session to hear from Mike Walls, a US Navy officer with combat cyber operations experience, who will share insights on how to keep your organizations' data secure against the most persistent and...
November 20, 2014
Organizer: ISMG
Location: Webcast
Add Favorite
Optimize, Accelerate, and Secure VDI to...
Explore solutions that enhance the performance of VDI over the WAN, while dramatically simplifying operational complexities. Learn about this approach that eliminates the need for point solutions by providing granular, policy-based, and context-aware access, and support for strong multi-factor authentication. Join F5 Networks and Carahsoft for a complimentary webcast that will cover the following: Building a scalable and extensible VDI Securin...
November 18, 2014
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Certified Ethical Hacker (CEH)
CEHv8 is a comprehensive ethical hacking and information systems security auditing program focusing on latest security threats, advanced attack vectors and practical real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures. Our researchers have invested thousands of man hours researching the latest trends and uncovering the covert techniques used by the underground community. iWeek offers the cou...
November 10-14, 2014
Organizer: EC-Council
Location: Webcast
Add Favorite
Back to Search Begin New Search