4,253 webcasts found
+ 63270 past events found
Back to Search Begin New Search Save Search Auto-Notify
Data Management Finally Made Simpler -...
Are you curious about how to transform your data management? Attendees learned how to:How to simplify complex data managementBring together different types of storageIncrease efficiency and unlock new opportunitiesRegister today for this partner session on how to securely manage data across any environment.
Add Favorite
ATO in a Day: Lessons from the USMC MCC...
Legacy compliance practices and waterfall acquisition models have hindered mission readiness for years—costing for some over $100K per month, per system and delaying the deployment of critical systems by more than two years. Between 2018 and 2022, only one of five major ATOs achieved a 3-year authorization, frustrating leadership and perpetuating bottlenecks. This fireside chat revealed how the USMC Community Services tackled these chall...
Add Favorite
Enhance Your Email Security with Mimecast
In today’s ever-evolving threat landscape, email security is more critical than ever. Attendees of this exclusive demo learned how Mimecast's advanced email security solutions can protect their organizations from the latest threats. View the on-demand recording to learn more about how Mimecast can protect your organization!
Add Favorite
Securing the Identity Plane: Enhancing...
As the Department of Defense (DoD) continues its effort towards its zero trust objectives, identity is quickly recognized as the critical foundation to which all of the pillars depend. Unfortunately, identity based attacks are on the rise and present a unique and continued risk to the DoD enterprise. Explore the complexities of the numerous identity planes in an environment and how the native capabilities and integrations between CrowdStrike a...
Add Favorite
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application, however, many times these...
Add Favorite
The Circle of Viz: Content Promotion Li...
Discover strategies for managing projects, user groups and content permissions to effectively promote and distribute content across your Tableau environment. Learn how to streamline Tableau content management, simplify processes and boost work efficiency. During this webinar, attendees learned:The Key Metrics of Success: Develop a plan and set measures to gauge the success of Tableau content promotion efforts.Site and Project Architecture: Div...
Add Favorite
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
Add Favorite
The History of Seepage Technology Development
A historical timeline will be presented that describes the significant seepage-related failure case histories and how various technology developed for seepage analyses and evaluations, including potential failure modes. The history of seepage technology begins in the 1800's but accelerates in the early 1900's and through the late 1980's. Each critical milestone in the evolution of seepage technology will be identified along with key published...
Add Favorite
How to Engage with CIOs
In this exclusive partner webinar, Ted Brodheim, former CIO and current Global CIO Advisor at Zoom Communications, shared his expert perspective on successfully engaging with Chief Information Officers (CIOs).In this session, Ted provided Zoom resale partners with a deeper understanding of what CIOs prioritize when purchasing technology, how they navigate the buying process, and how to foster strong relationships with these key decision-makers...
Add Favorite
HHS IT Simplified: Why Automation Matte...
Red Hat and Carahsoft hosted an HHS exclusive webinar on February 12th on a technical overview of Red Hat Ansible Automation Platform. This session explored:Key features and capabilities of Ansible tailored for HHS needsBest practices for scalable IT automationThe latest updates and enhancements in Ansible Automation Platform
Add Favorite
Back to Search Begin New Search