Back to Search Begin New Search Save Search Auto-Notify
Safeguarding Your Data: Meeting CMMC Le...
Participants attended our Google Workspace CMMC webinar to learn how your organization can achieve CMMC Level 2 compliance and safeguard your sensitive data. With the upcoming accreditation requirements from the Department of Defense, it's more critical than ever for the Defense Industrial Base to secure Controlled Unclassified Information (CUI). Attendees joined us to learn about CMMC and why it's important, demonstrate how to leverage Google...
Add Favorite
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. During this webinar, Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist,...
Add Favorite
Stronger Together: Modernizing Records...
Key topics include: “Why” – Applying lessons learned to state and local government challenges Benefits of adopting more Microsoft 365 tools for data governance Approach to implementing tools – Discover, Design, Migrate, Train, Maintain Tools available in the Microsoft 365 universe for data governance and security, including AvePoint add-on tools to improve functionality
Add Favorite
A Blueprint to Defeat Social Engineerin...
A new social engineering-led threat is targeting IT Help Desks, and new strategies are required to defend against it. Gangs like Scattered Spider are honing their techniques and tools to exploit weaknesses in your security process and target institutions like yours with ransomware and data theft. Visionary CISOs are implementing novel defenses to fight back.During this webinar, attendees learned:What is the new social engineering threat?Which...
Add Favorite
Unified Approach for Continuous Threat...
State and local governments and educational institutions face a growing challenge: securing interconnected IT and OT systems from modern cyber threats. Traditional siloed defenses are no longer enough. This webinar pertained to cybersecurity leaders ready to move beyond fragmented strategies and embrace a cohesive ‘whole-of-state’ approach. Attendees explored how to build a unified cybersecurity framework that leverages shared reso...
Add Favorite
Optimizing AI, Analytics and Databases...
Carahsoft hosted a live session highlighting the latest updates to the HPE Alletra Storage MP B10000 platform, including R5 enhancements and key workload insights. Attendees learned how this innovative storage solution supported a broad ecosystem of enterprise applications and drove success across industries. What was covered:What’s new in the HPE Alletra Storage MP B10000 and R5 updatesHow to optimize performance for AI, SAS Analytics,...
Add Favorite
Beyond Extractions: Rethink How You Sha...
There’s so much more to mobile evidence workflows beyond the device extraction. From the moment a device is submitted to the lab, maintaining the chain of custody is especially critical, and sharing that digital evidence with key stakeholders only adds to the challenge. However, many agencies are still using old habits and risky shortcuts during evidence handoffs that can ultimately delay justice.Cellebrite can solve these issues for you...
Add Favorite
Market Myths on AutoSys & Its Futuristi...
During this webinar, attendees explored the strategic direction of AutoSys and how innovations are designed to empower IT teams with more intelligence, felxibility, and autoamtion at scale. This webinar provided a clear snapshaot of where AutoSys stands today—driving operational efficiency, ensuring reliability, and enabling scalability across hybrid environments. Attendees learned about:The current and future state of AutoSysSubstantial...
Add Favorite
Digital Transformation through Integration
As digital threads and AI become a larger component of enterprise infrastructure, being able to manage data integration at scale is critical for operational efficiency. During this webinar, attendees learned how MuleSoft enables operational efficiency and digital transformation through integration. Download the on-demand recording to:Learn the benefits of a layered integration strategyUnderstand how integration is paramount to enterprise AIRef...
Add Favorite
Advancing Military and Veteran Health I...
Military and Veteran Health IT leaders face unique security challenges requiring robust and flexible solutions. During this webinar, Zscaler spotlighted Trusted Internet Connections (TIC) 3.0 and its pivotal role in strengthening security while enabling seamless interagency collaboration. Attendees gained insights into implementation strategies and compliance requirements that align with the dynamic needs of the Federal health community. What...
Add Favorite
Back to Search Begin New Search