Back to Search Begin New Search Save Search Auto-Notify
Zero Trust Strategies for DoD Compliance
For companies in the U.S. Defense Industrial Base, modern realities like a remote workforce or managing cloud services can feel at odds with security and compliance requirements. Adopting a zero-trust strategy in the cloud helps business leaders and IT administrators tasked with implementing DFARS requirements, managing ITAR compliance, or preparing for the changing CMMC program, to accelerate compliance timelines and lighten the burden of tec...
Add Favorite
NGINX Kubernetes Ingress Controller
Registration for this event is now closed As the Federal government continues to embrace modern application development processes, we are seeing an increased demand for NGINX expertise across the government, with open positions demanding experience. As a result, we are offering a new NGINX accreditation series. Join F5 and NGINX for a training focused on helping agencies leverage NGINX solutions to position and effectively support the Federal...
Add Favorite
Fraud Beyond the Pandemic: The Role of...
Public sector agencies’ digital strategies were put to the test by the pandemic. With legacy and manual systems pushed to their limits by the new digital age, agency leaders were faced with the unprecedented task of scaling digital solutions which suddenly became the default channel for millions of interactions with the population. Public sector professionals stepped up to the challenge. However, as the effects of the pandemic ease, indi...
Add Favorite
Secure Collaboration in M365 within a Z...
Microsoft 365 quickly brings together collaborators across your agency and your partners. That built-in collaboration, however, creates new concerns around tracking who has access across your environment. Organizations must monitor how users interact with data within a Zero Trust Architecture. The recent Executive Order on Cybersecurity focused on federal networks when implementing a Zero Trust Architecture, causing IT organizations to shift t...
Add Favorite
CMMC 2.0: Five Simple Steps to an Effec...
Registration for this event is now closed For companies in the U.S. Defense Industrial Base, the cost and complexity of supporting a remote workforce or managing cloud services can feel daunting with the ongoing changes in security and compliance requirements. Adopting a zero-trust strategy helps business leaders tasked with implementing DFARS requirements, managing ITAR compliance, or preparing for the changing CMMC program, accelerate compli...
Add Favorite
Three Keys to Fulfill New Cybersecurity...
Join AWS, Wickr, Presidio Federal and Carahsoft to explore how together we can help your agency meet fulfill these requirements with ease – from creating a plan to accelerate cloud adoption, building architectures with a zero-trust security model, and increasing your overall environments visibility for security and compliance purposes. You will walk away with invaluable knowledge on how to: Adopt easy to use, secure multi-factor authoriz...
Add Favorite
Ransomware Protection: Reducing the Imp...
There is no shortage of options to consider for improving your organization's security posture. As novel ransomware techniques continue to proliferate, choosing the most effective project to prioritize is critical. Choosing correctly means weighing the efficacy, effort, and cost to determine which has the highest value in buying down ransomware risk.Join us as Garrett Weber, Director of Solutions Engineering at Akamai (previously at Guardicore...
Add Favorite
Boosting Your Zero Trust Security Postu...
Most solutions to security problems take a siloed approach. The problem is ransomware is capable of interacting with all parts of your IT environment, so focusing efforts on just one part of it will have diminishing returns. Dealing with ransomware demands a holistic approach. Zscaler 'Active Defense' and Deception technology helps agencies defend against ransomware by: Sending early warning for pre-breach attacks Creating a fake attack surfac...
Add Favorite
Zero-Trust Mobile Application Environment
With the pandemic, the DOD has to depend on and leverage mobility even more. This has only increased the demand and desire for more first and third party applications to be deployed. With the rush of demand comes the struggle to deploy without SOP's. NowSecure can optimize your mobile AppSec pipeline to meet that demand.With the push for these new mobile applications, many agencies have discovered there is a need for integrated continuous test...
Add Favorite
Simplifying Hybrid Cloud Deployment wit...
Join Palo Alto Networks, Squadra Solutions, and Carahsoft Technology as we host a webinar focusing on Palo Alto Networks' powerful secure access service edge (SASE) solution called Prisma® Access. We will be discussing how their generation SASE can scale and secure your agency's mission applications in the cloud. Prisma Access provides identity-based Zero Trust Network Access with the best-in-class security - including threat monitoring fo...
Add Favorite
Back to Search Begin New Search