Back to Search Begin New Search Save Search Auto-Notify
A 360-Degree View of Federal Network Security
Protecting data on government networks is a critical component of our national Cyber Security strategy. Indeed, the Administration’s drive to strengthen Federal cybersecurity calls for a re-examination of government’s legacy approach that requires every agency to build and defend its own networks. Agencies concerns range from the use of encryption to the data explosion from the Internet of Things.This briefing will draw upon govern...
May 17, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Enhance Your Security with Adobe ColdFu...
Adobe ColdFusion 2016 provides a platform for building scalable and secure web applications quickly. One of the major advantages of the software platform is its Acrobat Portable Document Format (PDF) creation and manipulation capabilities. Driving today’s government solutions is a focus on data security, and Adobe ColdFusion 2016 continues to deliver capabilities for easily securing applications. Securing document data has never been eas...
May 11, 2016
Organizer: Adobe Government at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Best Practices for Protecting High Valu...
OMB's Cybersecurity Strategy and Implementation Plan (CISP) underscores the need for agencies to implement a defense in depth strategy to protect their high value information and assets, especially sensitive data, sensitive keys, and identity credentials. Sensitive data-at-rest is generally the most vulnerable once a breach has occurred, because of its volume and relevance. Attackers far too often hijack privileged accounts with full access to...
April 26, 2016
Organizer: SafeNet Assured Technologies
Location: Webcast
Add Favorite
The Defense Department Information Envi...
At today’s rate of growth, the size of the digital universe in 2025 will be 176 zettabytes of information. To put that in perspective, a single zettabyte is enough to hold 250 billion DVDs. All of it could have some relevance to national security. The Defense Department and Intelligence Community will be in charge of managing an exponentially growing amount of outside data, along with an exploding volume of internal data from soldiers in...
April 26, 2016
Organizer: Defense One
Location: Webcast
Add Favorite
SSL Everywhere
Join F5 Networks and Carahsoft for a deep architectural discussion on SSL/TLS trends, vulnerabilities, mitigations, and best practices of deployment for your mission critical applications. In addition to an overview on SSL trends and recent methods of attacks, we will focus on SSL encryption and decryption for inspecting encrypted traffic. Learn how adversaries increasingly evade cybersecurity tools by using SSL/TLS as a cover of darkness for...
March 24, 2016
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Data Security Tech Talk - San Diego
Vormetric and Guidepoint Security are proud to host an event with guest speaker, Jay McGowan, US Liaison Officer to CYBERPOL and Former Cyber Counter-Intelligence Chief at NRO. We will be discussing how to protect classified or sensitive data from Insider Threats and APT (Advanced Persistent Threats) that comprise credentials. Insider-implemented breaches, such as those by Edward Snowden and Bradley Manning, can not only severely cripple the a...
March 9, 2016
Organizer: Vormetric Government at Carahsoft Technology Corp.
Location: San Diego, CA
Add Favorite
Critical Differences Between Canadian a...
Don't Make the Mistake of Assuming US and Canadian Laws are the Same. Avoid the Cases Where Compliance with One Law May Be a Violation of Another Law. February 18, 2016 John Boscariol Partner McCarthy Tétrault JOHN BOSCARIOL is head of McCarthy Tétrault’s International Trade and Investment Law Group and a partner in the Litigation Group. He is ranked as a leader in the field of international trade and investment law in nume...
February 18, 2016
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Export Control Fundamentals for Engineers
Pending California CLE Credit Approval (1.5 Credit Hours) Learn More Pending NCBFAA NEI = 1.5 CES ECoP®EAR or ITAR renewal credits = 1 This webinar is intended for engineers, project and product managers who need a basic understanding of export controls, particularly EAR and ITAR controls on technical data. This webinar will focus on the following topics: Identifying exports — a day in the life of an engineer as she supports new prod...
January 26, 2016
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Export Control Recordkeeping in a Paper...
Pending California CLE Credit Approval (1.5 Credit Hours) Learn More Pending NCBFAA NEI = 1.5 CES ECoP®EAR or ITAR renewal credits = 1 Gone are the days when you could keep hard copies of all your export records in filing cabinets in your office. These days you may be required by your company to reduce or eliminate the amount of paper you keep. So how do you go about essentially re-creating paper files in the digital world? How can you mai...
January 21, 2016
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Cost-Effective Unlimited Video Storage...
Law enforcement agencies across the country are considering body-worn cameras for every public safety officer. These videos are instrumental in avoiding unsubstantiated claims of violence and mistreatment. So what is stopping widespread adoption? Cost and complexity. Until now, adopting this crucial technology has meant massive investments in secure storage and administration for terabytes of video files. Google has a better option that can dr...
December 15, 2015
Organizer: Google Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search