Back to Search Begin New Search Save Search Auto-Notify
Learn How 5 Steps Can Mitigate Ransomwa...
According to Ponemon, 88% of public sector organizations have experienced at least one cyber-attack in the past two years. Why? This is because public sector organizations offer an abundance of sensitive data for hackers including social security numbers, confidential health and finance records, and valuable intellectual property. The number of hacking, ransomware and cybercrime events continues to grow. Are you prepared? Join Otava, Veeam, an...
Add Favorite
Securing DoD Enterprise Innovation with ICAM
Agency modernization, expanding cloud deployments, and distributed workforces create new planes of privilege for adversaries to exploit. When designing the future state of The Defense Department's complex enterprise network, a least-privilege approach is critical to keep pace with adversaries and lower your attack surface. With users and devices now accessing critical information, systems, and applications from anywhere, the mindset must be to...
Add Favorite
Ransomware Got You Worried? Refresh You...
Join Secureworks and Carahsoft for a virtual happy hour and webinar featuring two pros, Rob Lelewski and Erin Petrey. Rob Lelewski, Director of Proactive Incident Response Services at Secureworks, will provide some best practices and proactive measures your team can take to prepare for the inevitable ransomware attack. His discussion will focus on common shortcoming that are regularly observed both in the emergencies that the Secureworks incid...
Add Favorite
Understand the Cloud with Cloud Economics
Join VMware and Carahsoft to learn about Cloud Economics and how it can be used to make better decisions when choosing cloud offerings. Hear about the origins of Cloud Economics and about the key factors state and local governments should consider when moving workloads and virtual machines (VM) to the cloud. Join us on September 9th to hear Bill Roth, Director of Cloud Economics at VMware, discuss: Using VMware Cloud on Dell EMC to extend the...
Add Favorite
BMS Security for Government
Join Tenable and Carahsoft on September 14th as we discuss why industrial cyber security is essential to eliminate many of the core risks associated with the new reality that is present in BMS environments. Learn about the automation and operations technologies employed along with some of the security issues it can introduce; and how you can remain secure. Topics include: The anatomy of a cyber attack on BMS Common vulnerabilities and key sec...
Add Favorite
Identity as the Foundation of Zero Trust
President Biden's Executive Order on Improving the Nation's Cybersecurity states that agencies must "develop a plan to implement Zero Trust Architecture" and "identify activities that will have the most immediate security impact, and include a schedule to implement them." In a Zero Trust Architecture, automation and orchestration of Federal Identity, Credential and Access Management (ICAM) is the first step to address the most critical securit...
Add Favorite
Modernize Infrastructure and Cybersecurity
Government agencies are under a lot of pressure to innovate faster and deliver better citizen experiences. But legacy systems and tight budgets are serious barriers to modernization. What these agencies need is a solution that automates workflows for mission and business applications.During this webinar, we will learn how ServiceNow enables government agencies to:Deliver consumer-like digital experiencesOptimize workforce efficiencyAccelerate...
Add Favorite
How to Mitigate Ransomware Attacks and...
According to Ponemon, 88% of public sector organizations have experienced at least one cyber-attack in the past two years. Why? Public sector organizations offer an abundance of sensitive data for hackers including social security numbers, confidential health and finance records, and valuable intellectual property. The number of hacking, ransomware, and cybercrime events continues to grow. Are you prepared? Join Otava, Veeam, and Carahsoft as...
Add Favorite
Cybersecurity Executive Order: 10 Datab...
In today's digital economy, data is the lifeblood of business. Protecting sensitive data has become more challenging for organizations in recent years. It's not simply the increase in the volume of data or the increase in threats - it's also the fact that as organizations have become more digital, they are moving more of their data and IT infrastructure to a mix of private and public clouds. With the additional impact of the recent Presidentia...
Add Favorite
The Journey to Zero Trust
Zero Trust can be a confusing concept for many organizations, especially for those that are at an early stage of its adoption. Zero Trust solutions protect networks, applications, and data based on the concept of "never trust, always verify." In a Zero Trust environment, identity is the core security control used by security teams that "assume breach" because any user or device is a potential threat actor. Join us on October 14th for a live we...
Add Favorite
Back to Search Begin New Search