Back to Search Begin New Search Save Search Auto-Notify
Live Webinar: Transformative Digital En...
Join Principal Systems Engineer Cary Bryczek for a webinar to discuss how Jama Software's modern approach to digital engineering bridges the gap between modeling tools and the siloed document world. Guidance released by the U.S. Secretary of Defense in 2018 urged government organizations to put in place new practices to modernize delivered systems with an emphasis on accelerating delivery. Is your organization prepared to undergo this digital...
Add Favorite
Protecting Your Election Security Infra...
Join F5 Networks and Carahsoft for an in-depth overview of the election system threat landscape, attack surface, bots and botnets, and zero-trust principles to protect election infrastructure. With the 2020 election cycles on the horizon, now is the perfect time to brush up on election security concepts and how F5 solutions protect this critical infrastructure.This webinar will discuss how F5 provides a variety of security solutions to mitigat...
Add Favorite
PeopleSoft Best Practices: Secure Acces...
As the core of your organization, sensitive data inside PeopleSoft has become a top target for malicious threats. Both internally and externally. With native PeopleSoft security and compliance features trying to keep up with modern threats, organizations must evaluate strategies to strengthen authentication and gain deeper visibility into user activity. Join Appsian and Carahsoft, during their webinar, as PeopleSoft experts at Appsian discuss:...
Add Favorite
Identify and Prevent Ransomware Attacks
Ransomware attacks on colleges and universities are the latest cyber threat to hit the headlines. Reports from campuses in Colorado, New Jersey, and New York City are the latest examples of how higher education is one of the most targeted industries with a significant number of users and vast amounts of data to protect.If successful, ransomware attacks have proven to be extremely lucrative. Security leaders within higher education need strateg...
Add Favorite
SAP ERP Best Practices: Strengthen Acce...
As the core of your organization, the business risks inherent with users executing transactions inside SAP can be costly, time-consuming to remediate, and damaging to an organization's reputation. With native SAP security and compliance features failing to keep up with today's dynamic threats, organizations must evaluate strategies for strengthening access controls and gaining deeper visibility into user activity. Join Appsian and Carahsoft, d...
Add Favorite
Let's Take This Online
Have you been hesitant to make the switch to virtual classrooms? Maybe you have one, but just don't like using it. There are so many things to love about in-person classroom interactions - seeing your trainees face-to-face, answering their questions as they come up, and breaking them into groups to discuss and learn from each other. Besides, you love sitting in traffic on your way to work, traveling to remote offices to train other teams, and...
Add Favorite
Identify Nefarious Actors and Prevent D...
You are invited to join SailPoint and Splunk for a live webinar on Tuesday, February 18th to learn about the challenges and impact of Insider Threat and how Identity and Access Governance, Privileged User Management, and User Behavior Analytics are critical in protecting high value assets from nefarious actors. When properly implemented modern identity governance and administration, identity audit, behavior monitoring, and analytics provide vi...
Add Favorite
AvePoint Webinar: Debunking Myths: Nati...
Join AvePoint for a free webinar where we will debunk some of the more popular myths to show you how to maximize your coverage using native capabilities. Native Office 365 retention capabilities are often undersold by third-party backup vendors, leading agencies to second guess what level of data protection they actually need. The reality is that native safeguards, when managed correctly, can be the right choice for certain agencies to cover c...
Add Favorite
Splunk Enterprise Security for the Army
Splunk Enterprise Security (ES) is the nerve center of the security ecosystem, giving teams the insight to quickly detect and respond to internal and external attacks, and simplify threat management minimizing risk. Splunk ES helps teams gain organization-wide visibility and security intelligence for continuous monitoring, incident response, SOC operations, and providing executives a window into business risk.Join Splunk and Carahsoft for a pr...
Add Favorite
Accelerate Video Content Creation with...
Communicating with citizens in today's government landscape requires creating engaging digital content that can be accessed across every surface and will resonate with all audiences. The industry-leading video editing software, Adobe Premiere Pro, enables creative professionals to bring their agency's story to life with workflows to craft footage into polished films and videos. Additionally, creatives can work seamlessly with other apps and se...
Add Favorite
Back to Search Begin New Search