Create, Collaborate, and Edit with a Mo...
Whether you're new to podcasting or looking to drastically speed up your workflow, this webinar will get you up to speed and show you the future of audio-visual content creation. Watch our on-demand webinar to learn about the major benefits of the new web-based Adobe Podcast application and how to use Adobe Premiere to give your episodes a professional finish. Watch this on-demand webinar to learn about:The new web-based Adobe Podcast applicat...
Scaling Remote Support in Education ...
Managing thousands of endpoints across campuses while meeting classroom demands isn’t easy. Nash County Public Schools joined BeyondTrust to explore how modern remote support can transform IT operations. In this conversation, Tremain McQueen (CTO) and JR Williams (Sr. Network Engineer) from Nash County Public Schools joined moderator Bill Venteicher (Director of Public Sector Marketing, BeyondTrust) and shared how they modernized remote...
Preparing For the Inevitable: Using Arm...
Traditional cybersecurity has long focused on building higher walls to keep threat actors out. Cyber resilience takes a more realistic approach, assuming breaches will occur and prioritizing the ability for the business to continue operating during and after an attack. In this webinar, we explored how Armis helps organizations move from reactive security to proactive cyber resilience by delivering the foundational intelligence needed to unders...
Gigamon In Action: Visibility That Powe...
Gigamon and Carahsoft hosted a demo desk, where we showcased how Gigamon helps organizations meet mandates like M-21-31, PCI DSS and HIPAA while improving operational efficiency. In this session, attendees discovered how powerful features like application intelligence can help simplify compliance and gain deeper insights into your network. During this complimentary demo, we covered:A brief introduction to the complianceHow Gigamon helps align...
Simplifying Zero Trust Through Allowlis...
Attendees learned how to:Align with CISA and NIST CSF 2.0 Zero Trust frameworksUse allowlisting to block unauthorized applications and control what runs in your environmentReduce ransomware risk through proactive endpoint protectionExtend the efficiency of your current security stack
What's New in Adobe Connect
Virtual sessions should do more than play back content. With the latest updates in Adobe Connect, hosts can turn recordings and live sessions into interactive experiences that keep audiences engaged and learning.Watch this on-demand Adobe webinar where Adobe Connect evangelist, Alistair Lee, showcased the newest updates that elevate engagement, speed up content creation and create more inclusive virtual experiences.Specifically, learn:Turn pas...
Better SecOps: Unifying Exposure and Th...
Government agencies bear a huge responsibility for protecting citizens’ sensitive data and defending their critical infrastructure from attack. Effective protection depends on a holistic, accurate understanding of data, assets, and vulnerabilities, but traditional security operations tooling makes it challenging to get that integrated view. Instead, teams struggle with data sitting in disconnected systems and inefficient manual processes...
Accessibility & Forms: Building Better...
In the U.S. and Canada, approximately 1 in 4 adults has a disability. For all government agencies, ensuring equal access to services should be a critical goal incorporated into IT modernization plans. As expectations for seamless self-service and intuitive digital experiences rise, meeting minimum standards is no longer sufficient; accessibility must stand as a cornerstone of digital trust and citizen equity. However, many organizations are un...
From Threat to Response: How CIS MDR Pr...
U.S. State, Local, Tribal and Territorial (SLTT) government organizations face unique cybersecurity challenges: limited staffing, decentralized IT environments, budget constraints and an ever-evolving threat landscape. These realities often leave teams overwhelmed and under-resourced, making it difficult to detect, respond to and recover from cyber incidents effectively.During this webinar, attendees learned:How CIS MDR provides accurate, cont...
Concurring complexity: Modernizing your...
This webinar explored how higher education institutions can streamline identity management in complex IT environments. SailPoint experts discussed the challenges created by multiple affiliations—such as student-employees and alumni-faculty—and shared strategies for managing overlapping roles effectively.Attendees learned practical approaches to centralizing identity data from multiple authoritative sources, automating access proces...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.