Back to Search Begin New Search Save Search Auto-Notify
ATO in a Day: Lessons from the USMC MCC...
Legacy compliance practices and waterfall acquisition models have hindered mission readiness for years—costing for some over $100K per month, per system and delaying the deployment of critical systems by more than two years. Between 2018 and 2022, only one of five major ATOs achieved a 3-year authorization, frustrating leadership and perpetuating bottlenecks. This fireside chat revealed how the USMC Community Services tackled these chall...
Add Favorite
Enhance Your Email Security with Mimecast
In today’s ever-evolving threat landscape, email security is more critical than ever. Attendees of this exclusive demo learned how Mimecast's advanced email security solutions can protect their organizations from the latest threats. View the on-demand recording to learn more about how Mimecast can protect your organization!
Add Favorite
F5 Capture the Flag
The F5 DISA team hosted an interactive Capture the Flag competition where attendees competed against others to hunt for API vulnerabilities and learn how they work. In this lab and Capture the Flag exercise, attendees learned how to identify and mitigate:Hard-Coded Secrets: Many applications exchange user credentials for a hard-coded token or key. This key allows anyone who knows it to gain access to the application, however, many times these...
Add Favorite
The Circle of Viz: Content Promotion Li...
Discover strategies for managing projects, user groups and content permissions to effectively promote and distribute content across your Tableau environment. Learn how to streamline Tableau content management, simplify processes and boost work efficiency. During this webinar, attendees learned:The Key Metrics of Success: Develop a plan and set measures to gauge the success of Tableau content promotion efforts.Site and Project Architecture: Div...
Add Favorite
Operationalizing Zero Trust: NIST and B...
Over 15 years since its initial conception and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become more important as a strategic framework for government and critical infrastructure alike. While the imperative to implement Zero Trust has been well established, the question of “how” is less clear. Enter NIST and the National Cybersecuri...
Add Favorite
How to Engage with CIOs
In this exclusive partner webinar, Ted Brodheim, former CIO and current Global CIO Advisor at Zoom Communications, shared his expert perspective on successfully engaging with Chief Information Officers (CIOs).In this session, Ted provided Zoom resale partners with a deeper understanding of what CIOs prioritize when purchasing technology, how they navigate the buying process, and how to foster strong relationships with these key decision-makers...
Add Favorite
HHS IT Simplified: Why Automation Matte...
Red Hat and Carahsoft hosted an HHS exclusive webinar on February 12th on a technical overview of Red Hat Ansible Automation Platform. This session explored:Key features and capabilities of Ansible tailored for HHS needsBest practices for scalable IT automationThe latest updates and enhancements in Ansible Automation Platform
Add Favorite
Use Cases in Threat Intelligence: Turni...
Attendees gained essential insights on modern cyber threats with experts from Google Public Sector and August Schell. The session explored the latest trends and emerging threats targeting U.S. Navy operations, aimed at strengthening cybersecurity and enhancing maritime security. Highlights included:A detailed overview of the current cyber threat intelligence and emerging trends targeting the U.S. public sector.Insights from Mandiant's latest t...
Add Favorite
Beyond the Generative AI Hype: Practica...
Experts shared insights on how Generative AI had been a transformative technology capable of revolutionizing public sector services by enabling AI agents to:Simplify communication by understanding everyday language.Converse with residents in their preferred language.Gather complete information through straightforward questions, reducing delays.Recommend relevant services for review and approval.Autocomplete paperwork using existing documents.H...
Add Favorite
PQC Migration: Where Are We Now?
Recent announcements from the likes of NIST, Gartner, and Google have highlighted the importance of post-quantum cryptography. These announcements have increased the sense of urgency for PQC migration. Given that PQC migration is a long-term and resource-intensive task, many are asking where the cryptography industry stands at this point. They want to know how they should be managing their PQC migrations, what kinds of tools they will need to...
Add Favorite
Back to Search Begin New Search