Back to Search Begin New Search Save Search Auto-Notify
Getting Identity Right Online: Insights...
Constituents want convenient, secure online government transactions via smartphones and laptops, but at the same time, bad actors are devising more clever schemes to impersonate real people and exploit online interactions. State governments stand in the middle as they attempt to provide frictionless digital services and make sure people are who they say they are. Join Government Technology and Socure for an in-depth exploration into the rapidl...
June 6, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Minecraft Education Hackathon Celebrati...
We are delighted to invite you to the celebration ceremony of the Minecraft Education Hackathon Tournament. This special event is dedicated to celebrating the innovative efforts and achievements of educators and students from around the world. The Hackathon has been a testament to the power of collaboration and creativity across borders. As we gather to honor the exceptional projects and the brilliant young minds behind them, your presence as...
June 6, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
June 6, 2024
Organizer: UberEther Government Team at Carahsoft
Location: Webcast
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Evolution of SIEM in the Cloud
In recent times, the landscape of Security Information and Event Management (SIEM) solutions has experienced a remarkable metamorphosis. No longer confined to being mere data repositories, SIEM platforms have evolved into dynamic hubs brimming with invaluable insights. Join us in this webcast as we embark on a journey through the contemporary realm of SIEM, spotlighting its departure from traditional methodologies, shifting to the cloud, and i...
June 6, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Implementing AI Provides Short & Long-T...
Government today faces a long list of imperatives in serving and defending its constituents while supporting and empowering its workforce. Constituents must trust that their need for essential services can be met with transparency, without sacrificing their privacy and security. Agencies and customers alike must feel safe from internal and external threats, including cyberattacks that could cripple infrastructure and disrupt vital services. Em...
June 7, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Tableau Server to Cloud: Lift & Shift v...
Is your on-premise Tableau Server hindering your data analysis capabilities? Tableau cloud beckons with faster analytics, scalability, security and simplified management, but migrating your entire Tableau environment can feel daunting. This upcoming webinar cuts through the confusion, unpacking the two main migration approaches viz: Lift & Shift and Tool-based migration. Come join Joseph Bernardo, Vice President of Data Value at USEReady,...
June 12, 2024
Organizer: Tableau Government Team at Carahsoft
Location: Webcast
Add Favorite
Trellis Data's Secure Speech: Secure Tr...
In the age of AI, government agencies need an accurate, efficient, and flexible speech-to-text service customizable for specific use cases, languages, dialects, and environments while maintaining full data custody. Join us to discover Trellis Secure Speech's powerful user features including keyword searching, real-time alerts, dynamic speaker ID, language identification, and translation between multiple languages. Additionally, learn how Trel...
June 12, 2024
Organizer: Trellis Data Government Team at Carahsoft
Location: Webcast
Add Favorite
Take home the GOLD with Veeam Data Protection
Join us June 13th for an interactive LEGO experience with Jeff Reichard, Vice President Solution Strategy at Veeam who will show Veeam's latest integrations allowing you to combine secure data protection with your existing security toolset and Adam Ward, LEGO extraordinaire, will simultaneously guide you through the assembly of an Olympics-themed LEGO model to inspire your data security efforts.
June 13, 2024
Organizer: Veeam Software Corp. Government Team at Carahsoft
Location: Webcast
Add Favorite
Empowering IT with NinjaOne
IT leaders in the Public Sector face unique challenges in supporting their endpoints and end-users. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabilities. In a...
June 13, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search