Live Demo: How to Reduce Software Risk...
Cybersecurity isn’t just about firewalls and scans — it starts with writing secure code from the beginning. Watch Security Journey and Carahsoft's recent webinar, to learn how Security Journey can help teams reduce software vulnerabilities by training developers and engineers to think and act with security in mind.In this session, attendees learned how to:Equips developers with practical secure coding skillsAligns with federal cybe...
Securing IT/OT Convergence: Lessons fro...
The convergence of IT and OT within the Department of Defense (DOD) and the federal government presents unique cybersecurity challenges, particularly in protecting critical infrastructure and industrial control systems. As highlighted in the latest CrowdStrike Global Threat Report, adversaries are increasingly targeting operational technology environments, exploiting vulnerabilities in industrial control systems and the Extended Internet of Th...
Endpoint Security in Higher Education:...
Higher education institutions face an increasingly complex threat landscape, with endpoints—laptops, mobile devices, IoT, and research systems—being prime targets for cyberattacks. As IT professionals, securing these diverse endpoints while maintaining academic accessibility is a constant challenge.This webinar explored advanced endpoint security strategies, including Zero Trust architecture, Endpoint Detection and Response (EDR),...
Automate and Improve Your Cyber Operati...
The Cyber Operational Readiness Assessment (CORA) program evaluates the cybersecurity posture and resiliency of each Authorization Boundary using a broad set of security, risk, and mission data. The problem for Defense and Intelligence Agencies is that they face limitations when trying to combine this data in meaningful, efficient ways that keep them continuously prepared for inspections.In our recent webinar, our Security and Risk Solution Co...
Quantum Technologies and the Public Sec...
Quantum technologies are rapidly moving from research labs into real-world applications. For government and public sector IT leaders, gaining a clear understanding of quantum computing, quantum networks, and post-quantum security is essential for making informed strategic decisions. These developments are reshaping the future of data protection, communications and mission-critical systems across the federal enterprise.In this session, Bob Gour...
A Government Framework for Proving Cybe...
Government cybersecurity investments are under greater scrutiny than ever. Agencies must secure mission-critical systems, meet complex compliance requirements and defend against escalating threats while justifying every dollar spent. Yet, traditional ROI models fall short when it comes to measuring the true value of risk reduction and prevention. Watch this webinar to learn more about Return on Mitigation (RoM), a novel framework designed to h...
Zero Trust Best Practices for Federal A...
In today's rapidly evolving cybersecurity landscape, federal agencies face increasing pressure to implement Zero Trust Architecture (ZTA) to safeguard critical assets, streamline access controls, and meet stringent compliance requirements. The Cybersecurity and Infrastructure Security Agency (CISA) has outlined a clear roadmap through their Zero Trust Maturity Model (ZTM), enabling agencies to move from traditional security approaches to a mor...
Fortinet Security Fabric: Fortifying Ne...
This webinar discussed the E-Rate eligible solutions of the Fortinet Security Fabric. Through a demonstration of available category 1 and category 2 E-rate eligible solutions, attendees learned how Fortinet can help their education organization achieve advanced, scalable cybersecurity for their schools.School IT departments face many challenges in keeping students, faculty and staff safe from cyber threats, like limited funding, while also mai...
Quantum-Safe & Zero Trust: What Every F...
Federal agencies are racing to modernize cybersecurity infrastructure — not only to prepare for the quantum threat, but also to meet evolving Zero Trust mandates. Join Arqit, Intel & GAI for an exclusive panel discussion on how quantum-safe technologies are enabling federal organizations to build resilient, Zero Trust-aligned environments today. Moderated by Harvey Morrison, CEO and Co-Founder of Marion Square, this discussion highli...
Live Demo: Navigating Networking in the...
We invite you to view our complimentary demo desk to learn more about the Fortinet Federal Secure Networking Stack. Experience a live demonstration of the FortiGate, FortiSwitch and FortiAP to see how Fortinet Federal can help with the Government's mission to do more with less. In the third demo of our series, we dived into how the Fortinet Federal Networking Stack can modernize your network, cut costs and strengthen cybersecurity with converg...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.