Modernizing Cybersecurity with VMware C...
During this webcast attendees learned about how vDefend can:Provide visibility and security intelligenceAdd firewall policies and advanced threat prevention with no underlying physical networking changesAddress many of the NIST Cyber Security Framework areas
Navigating Change with AI: Finding Effi...
In this new era of government efficiency, modernizing your agency's IT infrastructure is essential to meeting growing productivity demands with fewer resources. Artificial intelligence (AI) should be a cornerstone of your agency's IT modernization strategy, enhancing both security and operational workflows. Federal experts from GitLab hosted an online fireside chat and live Q&A session on April 24th about the challenges Federal IT teams ar...
RSA Public Sector Day 2025
Snyk attended the RSA Public Sector Event this year!RSA Public Sector Day is an annual event held as part of the RSA Conference, focusing on cybersecurity challenges and solutions pertinent to government agencies. The event gathers government leaders, industry experts, and academia to discuss pressing cybersecurity issues, share best practices, and explore collaborative solutions to enhance the security posture of public sector organizations.
Data Exfiltration - An Existential Thre...
View this complimentary webinar from Carahsoft and BlackFog where we explored how organizations can prevent ransomware and data exfiltration, featuring BlackFog’s Anti Data Exfiltration (ADX) solution. Data exfiltration is a major threat to all organizations, but government agencies face heightened risks. In 2024, the sector was the second most targeted by ransomware, behind healthcare, with 94% of attacks involving data exfiltration. Cy...
Paging Dr. Zero Trust: Securing Healthc...
Healthcare data is under siege. As attacks escalate in frequency and impact, ransomware and data breaches aren’t just IT issues; they’re business, operational and trust issues across the healthcare ecosystem. Patient safety, care delivery, member privacy and regulatory compliance are all on the line.View Trellix and Carahsoft's Paging Dr. Zero Trust: Securing Healthcare Data Before it Flatlines, a focused webinar built for leaders...
Cybersecurity Resilience for Public Wat...
Public water and wastewater systems are ideal targets for cybercriminals because they combine three ingredients: tight budgets, lax cybersecurity practices, and almost guaranteed publicity, even for small attacks. While agencies can’t control increasing hacktivism targeting their utilities, you can increase your resilience by implementing basic cyber hygiene practices that make you a less attractive target and limit the damage from a cyb...
How Deep Observability Improves Agency...
As agencies modernize their cybersecurity approach, aligning with Zero Trust (ZT) principles is no longer aspirational—it’s mission critical. But achieving a robust Zero Trust Architecture (ZTA) demands more than policy frameworks and access controls. It requires deep, continuous visibility into the network itself. This webinar explored how deep observability empowers agencies with actionable insights to meet Zero Trust compliance...
2025 FedRAMP Updates
stackArmor teamed up with Carahsoft, the leader in public sector cloud solutions for Federal and Public sector organizations, to provide an exclusive webinar that showcased how commercial ISVs as well as Federal Agencies can take actionable steps to meet new and emerging Federal cybersecurity mandates, including assessing AI systems risk.Topics of this webinar included:Developing and managing digital compliance artifacts using OSCALUsing SBOMs...
Navigating Budgets in the Modern Landscape
We invite you to view our complimentary Demo Desk: Navigating Budgets in the Modern Landscape. Learn more about the ever-evolving dynamics of budgeting in today's financial landscape. During the second demo of our series, we looked into how changes across the board have impacted cybersecurity funding, new administrative changes and how they have reshaped budgets on every level. We also reviewed the new administration's impact and how Fortinet...
Securing Digital Identities in a Changi...
Attendees gained:Insights from industry experts on the evolving cybersecurity landscape and federal regulationsBest practices for implementing phishing-resistant MFA and passwordless authenticationInteractive discussion with peers and thought leaders on the challenges and opportunities in federal IT security
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.