Next-Gen SOC at the Forefront
Recently, SOC Prime and Carahsoft hosted an exclusive webinar on the future of cybersecurity operations centers (SOCs). Participants discovered how next-gen SOCs empowered enterprise and MDR-focused organizations to stay ahead of evolving threats and minimize the risk of breaches by harnessing the power of cutting-edge technology, advanced automation, and community-driven threat intelligence.
Agentforce: Transforming the United Sta...
Attendees joined this exclusive webinar where the Salesforce DoD team unveiled Agentforce, a groundbreaking AI-powered solution built on AWS cloud services. They discovered how this cutting-edge platform transformed operations across the United States Department of Defense by enhancing mission readiness, streamlining operations, and driving efficiency. An expert panel guided participants through Agentforce's advanced capabilities, showcasing h...
Final Frontier of Endpoint Security: Tr...
Intel’s cybersecurity experts explored cutting-edge advancements in endpoint security. Attendees learned about the evolution of endpoint protection and the critical need for enhanced visibility and traceability below the operating system level. Experts shared insights and demonstrated how Intel’s trusted security platform provides unparalleled device visibility and control. The webinar covered how to:Enhance your organization...
Protecting Salesforce Environments: Con...
This webinar focused on the pivotal role of a secure vaulted copy of Salesforce data. Kaitlin Carrollo, Senior Solution Specialist at Commvault and Stephen Pipino, CISSP, Distinguished Cybersecurity Architect at Salesforce, discussed how Commvault ensures that the data your users interact with and create in Salesforce every day is protected and recoverable, all within the only FedRAMP High Authorized backup solution on the market.
Machine Identity Security Breakfast
Attendees joined Venafi, CyberArk & Carahsoft as we hosted a virtual event to learn about machine identity management challenges and solutions. The key takeaways attendees gained from this event:Expand Your Professional Network: Connect with peers and industry experts to exchange valuable insights and strategies for navigating current and future challenges in certificate lifecycle management.Future-Proof Your Cybersecurity: Dive into discu...
iboss Beyond Web Filtering
Carahsoft, Howard and iboss had an exclusive webinar tailored to K-12 IT Directors where attendees learned how iboss' Zero Trust SASE platform is transforming cybersecurity in schools. Webinar Highlights:Real-world examples of how iboss is helping schools stay ahead of cybersecurity threatsInsights into the latest trends in K-12 education cybersecurityLive Q&A session with experts from Howard and iboss
NIST NCCoE Practice Guide: Implementing...
F5 hosted an exclusive webinar on implementing Zero Trust architectures, featuring a special guest speaker from NIST. F5 provided an overview of how its technologies apply to Zero Trust Architecture, including where F5 BIG-IP fits within this NCCoE practice guide implementation. During this webinar, attendees:Explore the NIST National Cybersecurity Center of Excellence (NCCoE) and its critical work in developing real-world implementation guide...
Do You Trust Me? The Basis of ZTA Archi...
In this webinar experts from Commvault and ATP Gov explored integrating security into every aspect of the information architecture, aligning with NIST’s Cybersecurity Framework. Despite the extended deadline to 2027, agencies must leverage AI, automation, and advanced strategies to fortify their zero-trust frameworks. Further, they discussed the concept of cyber resilience and its crucial relationship to ZTA, ensuring a comprehensive and...
Strengthening DoD Cyber Resilience
In the rapidly evolving threat landscape, the Department of Defense faced unprecedented challenges in maintaining robust cybersecurity across its vast digital infrastructure. This workshop brought together two leading solutions in cyber defense, Armis and AttackIQ, to offer a comprehensive approach to strengthening your organization's security posture. Armis Overview Discovering and managing an accurate, unified and continuous asset inventory...
Navigating the Weaponization of Supply Chains
Access this webinar to learn how geopolitical dynamics are reshaping global supply chains and impacting government procurement strategies. This webinar covered real-world examples of supply chain weaponization, highlighting risks from dependence on foreign suppliers, especially those threatening U.S. security. Topics included trade restrictions, material shortages, and cybersecurity threats, with actionable strategies for building resilient, s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.