Back to Search Begin New Search Save Search Auto-Notify
Improve Your Cybersecurity and Align to...
The recent Executive Order on Improving the Nation's Cybersecurity mandates that government IT must move to a Zero Trust Architecture (ZTA). No small task as government IT is typically composed of a complex ecosystem of legacy technology and modern technologies like private and public cloud. The distributed nature of data across dissimilar IT environments has created new security challenges for federal agencies. Separate silos of enterprise st...
Add Favorite
What's the Secret to Disrupting Ransomw...
Join Tenable and Carahsoft, as we explore the anatomy of a ransomware attack and discuss protective measures you can take to better secure your organization, with emphasis on IT, Active Directory (AD), and OT (operational technology). During this webinar, we will discuss: Ransomware from the attacker's perspective Lessons learned from recent high-profile attacks Protective measures for disrupting and preventing successful exploitation How impl...
Add Favorite
Zero Trust Extended: Insider Risk
Did you know, 52% of people find it more difficult to detect and prevent insider attacks than external cyber attacks? As Federal departments and agencies move more mission critical services into the digital environment, security professionals are tasked to manage data leaks and data breaches. Join the panel discussion on emerging trends in approaches to insider risk management. Join our exclusive round table to learn more from industry leaders...
Add Favorite
You're Closer to Zero Trust Than You Think
Zero Trust is a philosophy change, not a product change. It's about taking what organizations already have and adapting the tools to be used more effectively. But creating a Zero Trust architecture isn't always so simple, and it's more of a journey than an end-goal. The challenges many agencies are facing today include; where to start, how to prioritize, and most importantly how to map out a plan and framework that is achievable for their use...
Add Favorite
The Future Begins Now with VMware Carbo...
Join VMware and Carahsoft for a webcast about VMware Carbon Black, where you’ll learn, VMware Carbon Black’s EDR capabilities and how they go above and beyond the guidelines in the latest executive order How to achieve 100% coverage with Carbon Black’s flexible EDR “Must-haves” for a successful EDR program New cyberattack methods in the current threat landscape How to enact remediation for endpoint incident respon...
Add Favorite
Best Practices for IoT Security
As organizations and agencies continue to digitally transform, IoT devices are becoming a critical component to enable companies to act quickly on information to increase competitive advantages and operational efficiencies. Their addition to IT environments allows for improved data utilization to manage technology better, increase output, and reduce costs and downtime. Optiv provides solutions to identify, segment, and protect IoT devices and...
Add Favorite
Protect Your Agency's Domain With a DMA...
Join Valimail and Carahsoft for a live webinar "Why implementing a DMARC solution is the most effective way to protect your agency's domain and reputation." Cybercriminals send 1.3 billion spoofing emails every single day. Are you certain your agency's email is fully protected and authenticated? Protecting your agency from cyber attacks and malicious hijacking of your domain is essential to maintaining your agency's reputation. Valimail Enforc...
Add Favorite
Industry Perspectives on CMMC 2.0
With recent discussions about changes to the Cybersecurity Maturity Model Certification (CMMC), Defense Industrial Base organizations can be sure that the intent and desired outcome of the program remains. Join this webinar to hear from experts at Carahsoft, Baker Tilly, and Pillsbury on the evolving CMMC program and what this means for the Defense Industrial Base. Topics include: What are the proposed changes with CMMC 2.0? Why should organiz...
Add Favorite
Cybersecurity Executive Order M-21-31:...
The U.S. Office of Management and Budget (OMB) published memorandum M-21-31 this year, which mandates a 24-month implementation deadline and expands upon the Cybersecurity Executive Order. To achieve the ambitious timeframe, federal agencies must adopt technologies that deliver a high level of out-of-the-box support for all requirements. With Securonix and Snowflake, those needs will be fully met. Join Securonix and Snowflake on December 14th...
Add Favorite
Deep Instinct Demo Desk
Deep Instinct leverages end-to-end learning to create instinctive prediction capabilities. Deep learning is inspired by the brain's ability to learn. Once a brain learns to identify an object, identification becomes second nature. Similarly, Deep Instinct's artificial deep neural network brain learns to prevent any type of cyber threat. Unlike detection and response-based solutions, which wait for the execution of an attack to react, Join Deep...
Add Favorite
Back to Search Begin New Search