Back to Search Begin New Search Save Search Auto-Notify
Hunt for Malware at Your Most Vulnerabl...
Endpoints – now more than ever – remain the most vulnerable attack vector. Complicating matters further, security solutions such as antivirus software on endpoints, are simply unprepared for these new threats. Join us on May 25th to learn how RSA NetWitness® Endpoint helps address this challenge by helping security teams detect and respond to known, unknown, and non-malware endpoint attacks. NetWitness® Endpoint is the endp...
May 25, 2017
Organizer: RSA Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
RSA and Assurance Data Spy Museum Lunch...
Join us for a luncheon briefing where you can join an exclusive group of your peers to learn how others are approaching the problem of hunting for malware on your networks and endpoint. Gone are the days of "set it and forget it" antivirus and firewall preventative tools, which gave you confidence that your network and endpoints were protected. We are now in the days of advanced persistent threats (APTs) and zero-day malware, which is malware...
April 25, 2017
Organizer: RSA Government Team at Carahsoft Technology Corp.
Location: Virtual
Add Favorite
Increased Government Security Through E...
Since large and small government organizations rely on a safe, secure, and resilient infrastructure, it's essential to understand how technology can help preserve operational continuity without interruption. Business resiliency programs can enable a centralized, consistent, and automated approach to business continuity and disaster recovery planning, allowing government organizations to apply best practices across their enterprise while enabli...
April 12, 2017
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Stronger Authentication With RSA SecurI...
Strong identity assurance rests on more than just strong authentication, it requires a context-based approach that links authentication and access policy to determine the appropriate level of authentication, while minimizing the impact on the end-user experience. View our complimentary on-demand webcast, and learn how RSA SecurID Access can help your agency: Enable centralized access to SaaS, web, and on-premises applications Extend the numbe...
March 8, 2017
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
RSA Conference USA 2017
Power of Opportunity Take advantage of this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you. In the digital world in which we now live, information is a very highly valued commodity. Safeguarding that...
February 13-17, 2017
Organizer: RSA
Location: San Francisco, CA
Add Favorite
RSA Public Sector Day
Register today to join your peers in public service, government IT luminaries, and RSA executives, for engaging government-specific sessions, high-profile keynotes, and the premier public sector networking event of the conference. RSA Public Sector Day is offered at no cost, for Federal, State, and Local government employees. Attendees of RSA Public Sector Day must obtain a RSA Conference pass to be eligible to attend. An expo pass for RSA Con...
February 13, 2017
Organizer: The RSA Government Team at Carahsoft Technology
Location: San Francisco, CA
Add Favorite
Virtual Session: Top Privacy Issues for...
For decades, information security functions have fought for the responsibility to monitor the flow of information through the organization, in paper and digital formats, throughout its entire life cycle, and to determine the existence and accuracy of data classification. This effort has largely been successful. However, if all data flows through security’s filters, it is incumbent upon security professionals to implement the proper cont...
January 31, 2017
Organizer: RSA Conference
Location: Webcast
Add Favorite
Enabling Rapid Data-Driven Security Dec...
Organizations have deployed multiple scanners that identify vulnerabilities but produce too much data to actually be helpful in managing security risk. Many organizations have implemented vulnerability scanning solely for compliance purposes and receive limited added value effectiveness of this fundamental control. Missed vulnerabilities, outstanding issues, and lack of clarity of ownership of vulnerabilities leave serious, ongoing holes in th...
December 15, 2016
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Identity Assurance with RSA SecurID Access
During this on-demand webcast you will learn how RSA SecurID Access can help your agency: Enable centralized access to SaaS, web, and on-premises applications Extend the number of authentication options available to end-users to include not only SecurID tokens, but also mobile OTP, fingerprint, eyeprint, and FIDO tokens Map initial, as well as step-up authentication, policies to individual applications Automatically invoke step-up authenticat...
November 10, 2016
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Combatting Advanced Threats With RSA Ne...
Federal security teams need to evolve to stay in front of attackers and the latest threats, but in recent years this has become much more difficult. Attackers continue their advance by using sophisticated techniques to infiltrate government systems. Tools, Tactics, and Procedures (TTPs) are the ways attackers work to target, exploit, and compromise organizations. Recently, attacker TTPs have become more sophisticated, mimicking normal Federal...
October 6, 2016
Organizer: RSA Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search