Back to Search Begin New Search Save Search Auto-Notify
Anchore VIPERR Workshop
Developing concrete processes and controls to secure your organization's software supply chain can absorb massive amounts of time and resources without guaranteeing significant security improvements. Enter VIPERR, an actionable software supply chain security framework developed by Anchore, synthesizing lessons learned from supporting the most challenging software supply chains across government agencies and the defense industrial base. Join An...
June 17, 2024
Organizer: Anchore Government Team at Carahsoft
Location: Reston, VA
Add Favorite
F5 BIG-IP Next - Explore the Next Gener...
Join F5 and Iron Bow at Rocket City Tavern on Tuesday, June 18th for a hands-on lab featuring BIG-IP Next. What you will learn: We invite all BIG-IP users to this personalized training on BIG-IP Next, F5’s Next Generation Platform. During the session, attendees will receive a first look at the BIG-IP Next platform while going through application deployment exercises to address load balancing, application security, and app access use case...
June 18, 2024
Organizer: F5 Government Team at Carahsoft
Location: Huntsville, AL
Add Favorite
Tackling the Elusive Non-Employee Problem
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, error-prone and leads to security vulnerabilities and compliance risks. Without a comprehensive identity security solutio...
June 18, 2024
Organizer: SailPoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Steering Through Complexity: Grasping C...
Join Nick Mistry, Lineaje's Chief Information Security Officer (CISO) and Scott Armstrong, Interos Industry Principal, for an illuminating webinar on the critical subjects of C-SCRIM (Cyber Supply Chain Risk Management) and SBOM (Software Bill of Materials) vulnerability information. Delve into the intricacies of specific policies and key regulations impacting cybersecurity, including Executive Order 2.A and the OMB Memo-CISA Attestation Form....
June 18, 2024
Organizer: Interos Government Team at Carahsoft
Location: Webcast
Add Favorite
5 Easy Wins to Achieving Zero Trust in...
Orca Security, in collaboration with GuidePoint Security invite you to this insightful webinar on June 18, 2024. Listen in as Neil Carpenter, Elizabeth Sims and Chris Romero delve into the challenges and solutions for achieving Zero Trust in the cloud. Hear insights revolving across the key pillars: Data Automation and Orchestration Governance Identities and Entitlements Application and Workload
June 18, 2024
Organizer: Orca Security Government Team at Carahsoft
Location: Webcast
Add Favorite
Why MDR Requires a Holistic, Cost-Effic...
Join us for a panel discussion with Splunk and Alchemy Security around the real need for managed security services and the power of Splunk to drive your cybersecurity and threat detection strategies. During this session, the panelists will discuss the challenges with black-box MDR providers and why adopting transparent, holistic solutions are the preferred answer for highly targeted, public-sector organizations. Join this webinar to gain insig...
June 18, 2024
Organizer: Splunk Government Team at Carahsoft
Location: Webcast
Add Favorite
Multi-Layered Identity Authentication f...
As fraud actors increase their operations in velocity and capabilities, especially with the use of emerging technologies as the weapons of choice, you and your citizens are at risk of becoming a victim. Are you able to rapidly and at scale, confirm who is behind the keyboard? If the answer is no, then this webinar is for you. It will help you in solving your identity authentication challenges, diminishing a fraudster's success. Our esteemed sp...
June 18, 2024
Organizer: Socure Government Team at Carahsoft
Location: Webcast
Add Favorite
How to Secure Your Agency's Identities...
A zero trust approach to securing your infrastructure is fundamental to reducing risk — and securing identities lies at the core of a successful zero trust strategy. Together, BeyondTrust and Ping Identity deliver the key components of zero trust including privileged identity security, using multi-factor authentication and SSO, with complete visibility and analytics. Join us on June 18 at 1:00pm ET for a tech talk and live demo to see ho...
June 18, 2024
Organizer: BeyondTrust Government Team at Carahsoft
Location: Webcast
Add Favorite
Women in AFCEA Virtual Happy Hour: June 2024
Join Women in AFCEA for our popular virtual happy hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. This month we'll be chatting with WIA marketing lead, Ariel Glassman, about how to optimize your LinkedIn profile and how to make it work for YOU!
June 18, 2024
Organizer: AFCEA International
Location: Webcast
Add Favorite
Unmasking Cyber Shadows: Enhancing Cybe...
Meet a powerful ally in the world of Cybersecurity: Constella Intelligence's Deep OSINT investigations fueled by AI, it taps into the world's largest breach data lake collected from the surface, deep and dark web. Join us to learn how agencies can leverage deep OSINT to:Disrupt crime at its source by uncovering synthetic Identities Conduct cybercriminal identify graphing to unveil threat actors at the individual level Achieve greater scalabili...
June 18, 2024
Organizer: Constella Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search