Back to Search Begin New Search Save Search Auto-Notify
Unraveling Digital Supply Chain Threats...
Attendees of this webinar joined Eclypsium for a discussion around digital supply chain threats, risks, and the hidden challenges that organizations are facing in safeguarding their device supply chains. Some key highlights from this discussion were: The role of Software Bill of Materials (SBOMs) in mitigating vulnerabilities and ensuring supply chain integrity. Practical strategies to tackle supply chain issues head-on, based on eye-opening i...
Add Favorite
Network Automation for EUCOM, AFRICOM ...
Network automation is critical to support the increasing application and workload needs of the U.S. Department of Defense (DoD). Red Hat Ansible, a foundation for building and operating IT automation at scale, provides improved control over and visibility into network resources, bringing real-time decision-making capabilities to the warfighter. EUCOM, AFRICOM & OCONUS colleagues attended a hands-on workshop participating in the application...
Add Favorite
Accelerating Emergency Management Respo...
Attendees who joined us learned about how Slack allows emergency responders to anticipate, monitor, and manage incidents for natural disasters, humanitarian crises, and other emergencies. They also had the opportunity to understand how Slack can speed up emergency response times by creating one centralized connected channel for alerts, responders, internal departments, external agencies, tools, and data. Register to view this on-demand recording.
Add Favorite
Outplaying Cybercriminals: Modern Ranso...
In this on-demand webinar, Jeff Adams, National Director, Cloud Sales Public Sector, VMware, and Matt McGarth, Global AWS Sales Synergy Leader, VMware, led an informative discussion on Modern Ransomware Recovery Strategies. Download this webinar now and learn how VMware and Amazon Web Services GovCloud are jointly engineered secure, on-demand cloud service that brings VMware’s rich Software-Defined Data Center software to the AWS GovClou...
Add Favorite
Deliver Secure Software at Scale
This Security Compass and Carahsoft webinar discussed the challenges that U.S. federal government agencies encounter when obtaining Authorization to Operate (ATO). As we examine these challenges, we'll explore how integrating security into the software development life cycle (SDLC) can enable agencies to obtain ATO faster and deliver secure compliant software at scale. What attendees of this on-demand webinar learned: Why the traditional appro...
Add Favorite
The Craft of Creating Virtual Experiences
Watch Adobe’s 3-part on-demand webinar series, The Craft of Creating Virtual Experiences, with Adobe Connect Evangelist, Alistair Lee. Each on-demand webinar focuses on a different component of designing your virtual meetings, events, and trainings to maximize effectiveness and showcase how to leverage the full capabilities of Adobe Connect. Fill out the form below the table to access the session recordings, available slide decks, and he...
Add Favorite
Diving into BOD 23-01: Why Asset Visibi...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published the Binding Operational Directive 23-01 for Improving Asset Visibility and Vulnerability Detection on Federal Networks with April 3, 2023 deadlines for all FCEB agencies. CISA’s asset visibility requirements are doing a big part in moving the industry forward and evolving the overall approach to asset inventory while also highlighting the importance of a comprehen...
Add Favorite
AWS D.C. Metropolitan Area Public Secto...
Attendees joined Amazon Web Services (AWS) industry experts in D.C. and learned how AWS can benefit their organization with a seamless shift to the cloud, the future of artificial intelligence and machine learning, and more. Register to view this on-demand recording.
Add Favorite
Splunk SOAR: Automation for the Modern SOC
During this webinar, we explored the ongoing challenges facing DOJ security teams and how Splunk SOAR can help you decrease incident response time while being a force multiplier for your teams. During this on-demand webinar, participants learned about: Challenges facing our security operations teams today The differences between Security Orchestration, Automation, and Response (SOAR) How SOAR can be a force multiplier for your organization and...
Add Favorite
NVIDIA Software for Government Series
As cybersecurity threats continue to escalate and diversify, agencies must look for new ways to address them. Collecting and analyzing all of the data across a network in real time is cost-prohibitive and difficult—unless you can leverage accelerated AI. NVIDIA Morpheus is an open application framework that enables cybersecurity developers to create optimized AI pipelines for filtering, processing and classifying large volumes of data. E...
Add Favorite
Back to Search Begin New Search