Back to Search Begin New Search Save Search Auto-Notify
Empowering IT with NinjaOne
IT leaders in the Public Sector face unique challenges in supporting their endpoints and end-users. By choosing and leveraging the right tools effectively, they can streamline endpoint management, reduce costs, improve services, and free up time for strategic IT projects, enhancing overall operational efficiency. NinjaOne is the leading unified IT management platform that simplifies IT workflows thanks to powerful automation capabilities. In a...
June 13, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Wings of Innovation: Transitioning to C...
Embark on a journey through the skies of Kubernetes as we navigate the fundamentals, deployment strategies, and security for a seamless transition from traditional cloud instances to containerized infrastructure. In the rapidly evolving realm of cloud technology, Aviata finds itself at a pivotal moment, ready to embark on a journey of transformation. With the pressing need to modernize their architecture looming large, the company sets its sig...
June 13, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
June 17, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
CrowdStrike Product Training Mini-Serie...
Cloud security is one of the most important topics for customers this year. More and more customers are looking for solutions, that can protect all cloud workloads and provide full visibility and transparency into their actual cloud configuration. Participants of this webinar will get a deep technical understanding on: How CrowdStrike protects all those Cloud Workload with CWP (Cloud Workload Protection) How CrowdStrike shows up a fully visibi...
June 20, 2024
Organizer: TD Synnex | CrowdStrike
Location: Webcast
Add Favorite
From Legacy to Leading Edge: Embracing...
As organizations pivot towards digital-first strategies, the imperative to adopt scalable and flexible identity frameworks has never been more critical. In an increasingly interconnected world, it is crucial for organizations to build a resilient identity architecture that not only supports current needs but anticipates future demands. Join CyberArk and UberEther on June 20th to explore the transformative journey from traditional, on-premises...
June 20, 2024
Organizer: CyberArk Government Team at Carahsoft
Location: Webcast
Add Favorite
Google Workspace California Webinar Series
In this webinar series, we will cover the following topics and more: Google Workspace for Government How Google Does Security GenAI - Realistic ways to make it work for you
June 25, 2024
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
2024 State of Security Automation Survey
Automation plays a vital role in improving capacity, efficiency, and performance in the SOC. Security teams spend far too much time “in the weeds,” unable to focus on solving the problems that matter. Security orchestration, automation, and response (SOAR) tools have the potential to streamline analysis, reduce response times, and improve quality. However, SOC teams often struggle to realize the full potential of this kind of autom...
June 25, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Consolidation. Automation. Security. Ju...
Healthcare IT teams of all sizes and experience levels are tasked with enabling medical staff to provide the best possible patient care. However, efficiently supporting a wide variety of medical devices, often shared and mobile, spread across sprawling medical campuses is not easy. It's even more daunting when you consider the increase threat of cyberattacks seeking to steal lucrative patient health information (PHI) or mount a successful...
June 26, 2024
Organizer: NinjaOne Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Secure Your Multi-Cloud Environment fro...
Security teams today are dealing with endless lists of security issues, but lacking the necessary tools to effectively detect and mitigate the highest risks in their multi-cloud environment. In this session, we will unveil the latest security posture innovations in Microsoft Defender for Cloud, that empower security teams to identify security vulnerabilities spanning from code to cloud, to effectively prioritize the most business-critical risk...
June 26, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Back to Search Begin New Search