Effective Ways to Augment Your Microsof...
Microsoft Office 365 allows your people to work anywhere, anytime, on any device, but that freedom creates security issues. Default email and cloud security features in M365 lack the forensics to accurately identify threats and lack the insights to understand the cyber risks that people pose to your organization. If you are looking for an easy security add-on to reduce risks on Microsoft 365 and potentially avoid infrastructure changes (such a...
December 21, 2022
Organizer:
Proofpoint Location:
Webcast
Predict and Prevent Service Disruptions...
This demo explores how ServiceNow's IT Operations Management solution consolidates noise during an event storm by intelligent alert grouping and actionable insights that help you narrow down the possible root causes for an outage. Shorten MTTR by surfacing key insights in the knowledge base and by automating resolutions.
December 21, 2022
Organizer:
ServiceNow Location:
Webcast
Reduce Software, Hardware and Cloud Costs
This demo explores how ServiceNow's Software Asset Management solution cuts software and cloud expenses by pinpointing shadow IT, reducing overlap, and optimizing licenses. Use automation and digital workflows to streamline management of software assets, feed critical asset data to the business, and prevent manual process errors.
December 21, 2022
Organizer:
ServiceNow Location:
Webcast
Optimize and Orchestrate Enterprise Sec...
This demo explores how ServiceNow's Security Incident Response solution enables teams to rapidly respond to evolving threats with Security Orchestration, Automation, and Response (SOAR) with context and AI for smart workflows. Use MITRE ATT&CK to investigate threats and partner with IT to prioritize and mitigate based on potential business impact to close gaps.
December 21, 2022
Organizer:
ServiceNow Location:
Webcast
Strengthening Security Program Outcomes...
As enterprise infrastructures have expanded in scope and complexity, so too have the cyberthreats that target them. In today’s digital-first environment, legacy security controls are unlikely to be able to stand up to the volume and sophistication of these attacks. Even newer security software may be overwhelming and require nuanced human intervention, which is not always accessible due to the continuing security skills shortage. To addr...
VMware Cloud on AWS Demo
Join us every Wednesday at 2:00pm EST for a 30 minute demo on how VMware Cloud on AWS can provide a unified infrastructure framework that bridges the gap between private and public clouds.
What You Need to Know About OpenAI's Ne...
OpenAI is a leading research institute focused on developing artificial intelligence technology in a safe and responsible manner. In this talk, we will discuss the potential risks that advanced AI poses to cybersecurity, and what steps are being taken to address these challenges. We will also explore the ways in which AI can be used to improve cybersecurity and protect against cyber threats. Overall, this talk will provide a comprehensive over...
Increasing Software Delivery Speed Securely
GitLab and Carahsoft are excited to invite you to join us to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. GitLab supports federal agencies' DevSecOps initiatives with one end-to-end software development platform meeting rigorous security and compliance requirements by enabling agencies to quickly add security scanning and Software Bill of Materials (SBOM) genera...
govDelivery Administrator Training 101
This training will most benefit administrators of all levels and will focus on the following day-to-day operations.: Topic creation Subscriber upload - including troubleshoot Advanced Bulletin personalization (template development) Advanced Bulletin create and send Bulletin analytics reporting Our training sessions last roughly an hour and are conducted by a member of our Implementation Team. Using Zoom, you'll be able to view the computer scr...
December 20, 2022
Organizer:
Granicus Location:
Webcast
VETS 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GW...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.