Achieving CMMC - Tangible Lessons from...
Attendees of this webinar heard directly from CMMC Subject Matter Experts with diverse perspectives on achieving CMMC compliance, including Redspin, a C3PAO that has conducted live joint surveillance assessments; PreVeil, an encrypted email and file sharing platform provider; Cyturus Technologies, a compliance and risk management platform provider; and Carahsoft, a Master Aggregator supporting the Defense Industrial Base. Attendees learned:Com...
Advanced API Security: Securing Cloud A...
Attendees of this on-demand webinar learned: How to detect attacks, suspicious behavior, and misconfigurations Prevent attacks and integrate with existing remediation and security infrastructure Actively test APIs before deployment
Enabling Resilience & Mobility for Fede...
With the increasing frequency, severity, and sophistication of cyber-attacks, it becomes imperative for organizations to continually adapt and enhance their solutions to effectively counter these threats. Zerto, a Hewlett Packard Enterprise company, helps federal agencies protect, recover, and move their data and applications for continuous availability across on-premises, hybrid, and multi-cloud environments. During this on-demand webinar, at...
How to Implement an Effective Threat Hu...
In this webinar How to Implement an Effective Threat Hunting Practice, CTO of Lumu, Jeff Wheat, discussed:The different types of threat hunting practicesRequirements for an effective threat hunting effortThree key steps to develop an effective, yet simple threat hunting practice
(IAM) Advantage: Best in Class Solution...
Attendees of this on-demand webinar learned how combining these trusted tools makes it easy to: Deliver the promised benefits of the last decade and enable the Zero Trust pillars Improve security, increase efficiency, and ensure better compliance with EO and RMF Directives Reduce the risk of data breaches and unauthorized access to sensitive information Streamline access granting and revocation to save time and resources while reducing risk
CMMC and Commoditizing Compliance Management
Alchemy Global Networks, Armis, and Carahsoft held a complimentary webinar to discuss how they had partnered as leaders in the government space to provide a holistic solution to compliance management by leveraging multiple vendors, including Splunk and others, to provide an unprecedented level of visibility into networks. Understanding Technical Debt & Point-in-Time Operations: Defined technical debt and its impact on IT environments, incl...
Accelerate Incident Response and Lower...
Nikhil Gupta, Sales Engineer Team Lead, Carahsoft presented an informative and interactive discussion on the integration between Forescout & ServiceNow that will help you better understand how the use cases and capabilities of this integration can help your organization maximize SOC efficiency. In this on-demand webinar, Forescout – ServiceNow integrated solutions increase operational efficiency and effectiveness with the following b...
Empowering your workforce: Strategies f...
Learn how to roll out a successful Cybersecurity Awareness Month program that boosts employee engagement all October (and beyond). Join Infosec’s Emma Waite and Camille Raymond to learn: What employee-related risk data is needed to quantify success How to communicate your NCSAM plans to stakeholders The content and cadence appropriate to drive engagement Creative ways organizations are celebrating NCSAM How to continue the momentum after...
Be Mission Ready with SimSpace Cyber Ra...
Founded in 2015 by experts from the U.S. Cyber Command and MIT’s Lincoln Laboratory, SimSpace combines the highest-fidelity, military-grade cyber ranges and training content with unique user and adversary emulation techniques. Attendees learned how SimSpace is enabling cybersecurity professionals in Federal agencies with measurable and quantifiable solutions to make informed decisions and optimize cyber mission readiness.
Protecting NextGen 911 Systems
Cyber criminals are increasingly targeting emergency response networks throughout the United States. The risk to Next Generation (NextGen) 911 systems posed by advanced malware and denial-of-service (DoS) attacks highlight the critical need for local governments to secure emergency response networks. In this on-demand webinar, we discovered how AI-powered security and networking combine to support public sector and educational networks, includ...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.