Back to Search Begin New Search Save Search Auto-Notify
TIC 3.0 Webinar Series
As more agencies rapidly shift to mobile workforces, there is a growing need to securely connect and scale remote workforces to ensure business continuity through Prisma Access.Join us for one of our upcoming webinars to learn how Prisma Access delivers consistent protection from the cloud and aligns to Trusted Internet Connection (TIC) 3.0 guidelines by:Bringing protection closer to usersAddressing use cases for remote branch and remote user...
Add Favorite
Google Cloud 2020 Webinar Series: Augme...
Hints of a threat can come from anywhere, including places you weren't expecting. Join Google Cloud and Carahsoft to learn how to protect you and your organization from potential threats. The key to identifying a threat is to gather all of your data, be able to uniformly examine your threat events, and be capable of drilling down and pivoting with direct access to underlying data. Master how to properly apply machine learning and analytics tha...
Add Favorite
Secure Virtual Trainings & Meetings wit...
Security is more than just a meeting password! In the current public health emergency, collaboration and eLearning cloud services bear a lot of responsibility to uphold the highest standards of information security and privacy. Critical organizational data and assets can be at risk, especially for industries like government, financial services, and healthcare who are running mission-critical operations online everyday.Join us as we highlight w...
Add Favorite
Safeguarding Sensitive and Compliant Da...
Join us for a complimentary webinar on April 23rd to discuss how Thales TCT and VMware can help you secure your hyper-converged data. VMware has partnered with the industry leader in access control encryption and key management solutions to allow its customers to secure data and centralize keys on their hyper-converged platform. Many government customers have now realized file-level access control, encryption, and key management are substantia...
Add Favorite
VMware Cloud on AWS: 5 Considerations f...
Join VMware and Carahsoft for a webcast to hear from VMware Cloud on AWS specialists at Effectual who have hands-on experience migrating large-scale environments to the VMware Cloud on AWS platform. While you likely have heard of the benefits of VMware Cloud on AWS, our speakers will be covering best practices for successful migration and addressing how to meet security and compliance standards with VMware Cloud on AWS. Effectual holds a VMwar...
Add Favorite
Putting MITRE ATT&CK Into Action
Utilizing compromised or fraudulent credentials are a disproportionate hot spot in threat reports. So, it makes sense to look for that in your threat hunting. But where do you start? The answer is MITRE ATT&CK. In this session, Exabeam will close the loop between MITRE ATT&CK TTPs and deep analysis of security events to recognize malicious activity that is difficult to distinguish from innocent day-to-day operations. Join us for this o...
Add Favorite
New DHS CISA TIC 3.0 Guidance Makes Clo...
Effective immediately, the Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) issued new TIC 3.0 guidance allowing agencies to roll out zero trust direct-to-cloud connections through cloud service providers (CSPs) that meet CISA guidelines. This new guidance helps agencies avoid the challenges of VPN, which include infrastructure exposure and highly latent traffic paths due to traffic being forced to tr...
Add Favorite
Defending Aganist Ransomware Attacks
Join our Tenable webinar on defending ransomware through effective vulnerability risk management. Implementing an effective ransomware defense strategy is not an impossible task. By ensuring proper implementation of basic cyber hygiene practices across the organization and focusing limited resources first on what matters most in terms of vulnerability remediation, public sector organizations can transform themselves from "soft" to "hard" rans...
Add Favorite
Emulating Threat Methodologies
Rapid7 and Carahsoft invite you to join us for a 30 minute webinar that will feature Ben Elser, Senior Security Solutions Engineer at Rapid7, digging into some of the ways attackers are leveraging their older exploits - specifically EternalBlue - on the latest surge of ransomware attacks against the U.S. Public Sector and what you can do to prevent them. Some of the topics we will cover during this brief presentation include: Introduction to T...
Add Favorite
Understand and Leverage Breached Data w...
Cyber-enabled crimes and frauds are extensive, can be highly advanced, and are becoming more and more common, leading to a loss in data, reputation, and funds. Organizations and businesses protecting from cyber-attacks require the collection and analysis of all types of data, including data that has appeared in breaches perpetrated by these cyber-attacks. Join us for this webinar to discover: Data breach trends and how this data can be used Ho...
Add Favorite
Back to Search Begin New Search