Back to Search Begin New Search Save Search Auto-Notify
Mastering DoDD 8140.03M: A Deeper Dive...
In this informative session, our experts guided you through the key aspects of the directive and helped you navigate the path to compliance. By attending this webinar, you learned about: Qualification Matrix Residential Qualifications Privileged User qualifications and tracking (including SAAR/DD2875 forms) Incorporate Proficiency Level Handling Contractors Register to view this on-demand recording.
Add Favorite
Scalable, Simple, and Secure Data Resilience
Public sector data and the sensitivity to protect the information they store make these organizations targets for increased ransomware attacks and other cyber threats while managing complex requirements with reduced budgets and resources. Cohesity relieves government and education IT staff by simplifying the management of data and apps. Unlock how to securely get a single and scalable web-scale platform for backup and recovery, files, objects,...
Add Favorite
Hunting the Next Big Cyber Threat: A Da...
Recorded Future is the world’s largest commercial collector of real-time threat intelligence, analyzing intelligence from around 1 million distinct sources on the open and dark web. Join Laura Taylor, a Solutions Engineer, as she discussed how Cyber Threat Intelligence (CTI) teams can use Recorded Future’s powerful analysis to hunt down the next big cyber threat. The on-demand webinar included an overview of: Recorded Future...
Add Favorite
Utilizing Cloud-based Resources: Effici...
Attendees joined CloudHesive, Amazon Web Services (AWS), and Carahsoft to hear how AWS and Cloudhesive can help to accelerate research through tailored technologies and solutions. Scott Friedman, Principal Technical Business Development Manager - AWS Research, AWS and Patrick Hannah, Chief Technology Officer, CloudHesive provided an overview of AWS' robust architecture and CloudHesive's suite of services that can help your organization meet Cy...
Add Favorite
Mastering the DoD Zero Trust Journey: B...
In a rapidly changing digital landscape, federal agencies face a constant battle against cyber threats. With the stakes higher than ever, you need a strategic advantage to safeguard your agency's sensitive assets and ensure the resilience of the Department of Defense network environment. Embracing the DoD Zero Trust Strategy is the key to unlocking this potential and positioning yourself as a hero in this evolving story. View the engaging webi...
Add Favorite
Mission First: Public Sector Podcast Series
Listen on-demand to episode three of our podcast series dedicated to covering the latest and greatest in IT achievements - keeping you ahead of the competition. Hear from Elizabeth Cappello, Deputy Chief Information Officer (CIO) for the Department of Homeland Security (DHS), and Craig Bowman, Senior Director - Federal for VMware, who will discuss: Meaningful implementation of Artifical Intelligence (AI) in cybersecurity How to view open stand...
Add Favorite
How to Resist Ransomware
Hear from federal cyber leaders at DOD and CyberArk on the best tips, tricks and strategies for resisting ransomware and protecting federal data. Ransomware attacks against federal IT systems surged to unprecedented levels at the beginning of the COVID-19 pandemic and show no sign of abating, with ransomware losses surpassing $1 billion in the second half of 2021. Federal agencies handling mission-sensitive medical, financial, demographic and...
Add Favorite
How U.S. Federal Agencies Can Apply TIC...
In this webinar speakers reviewed how US Federal agencies can apply Trusted Internet Connection (TIC) 3.0 to AWS workloads, as well as the AWS Year-End Savings (YES) Promotion for select AWS Services, available from June 8, 2023 to September 30, 2023. AWS subject matter experts discussed: What is the TIC initiative TIC 2.0 vs. TIC 3.0 differences TIC 3.0 controls How TIC 3.0 aligns with Zero Trust Applying TIC 3.0 framework to AWS workloads by...
Add Favorite
Enhancing Recovery from Natural ...
Attendees of this webinar listened as VMware's Senior Staff Solutions Engineer, Matthew Place, discussed: What is a disaster? Disaster Recovery vs. Ransomware Recovery – how are they different? A review of VMware disaster recovery capabilities A demo of a recovery scenario Register to view this on-demand recording.
Add Favorite
The New National Cybersecurity Strategy...
Attendees of this webinar joined OPSWAT for a discussion around the new National Cybersecurity Strategy, that builds upon previous efforts, such as Zero Trust, to bolster protections to secure America’s cyberspace and its digital ecosystem. The reliance on critical infrastructure makes those who manage it big targets for nation-state and ransomware attacks, as well as any members of the Defense Industrial Base that are managing the criti...
Add Favorite
Back to Search Begin New Search