Defense, Space, IT, Cyber and Intellige...
This in-person hiring fair is targeting Transitioning Service Members, Guard/Reserve, Veterans and Experienced Professionals with Active Security Clearances/Polygraphs, Space, Aviation, Cyber, IT, Engineering, Defense, and Intelligence backgrounds. Free admittance. The hiring fair is open to Active Duty, Guard/Reserve, Contractors, Veterans, and Experienced Civilians that have access to the military installation (DoD ID, CAC Card or Have Your...
Education Cyber Resilience: A 4-Part Se...
Join us for an exclusive webinar where Cisco and Proficio will explore today’s top cyber threats in education and how your institution can prepare. From real-world ransomware case studies to practical resilience planning, we’ll highlight proven strategies to strengthen security in both K–12 and higher education. Attend this webinar to gain insight into:Current threat trends in education, including ransomware-as-a-service, AI-...
Safeguarding Your Data: Meeting CMMC Le...
Register today for our Google Workspace CMMC webinar to learn how your organization can achieve CMMC Level 2 compliance and safeguard your sensitive data. With the upcoming accreditation requirements from the Department of Defense, it's more critical than ever for the Defense Industrial Base to secure Controlled Unclassified Information (CUI). Join us to learn about CMMC and why it's important, demonstrate how to leverage Google Works...
Zero Trust for Justice Systems: Stop Da...
Cyberattacks are increasingly targeting justice systems, threatening sensitive case records, legal documents and even the identities of witnesses and victims. Many organizations still rely on outdated perimeter defenses, leaving critical systems and individuals at risk. Join Zentera and Carahsoft on September 30th at 2 PM EST for an in-depth session on how Zentera’s “Collaboration Chambers” deliver Zero Trust security in hour...
Closing the Mobile Threat Blindspot: Wh...
Your SOC may have SIEM, SOAR, and EDR in place - but are you still blind to mobile threats? Attackers increasingly target employees through their smartphones with phishing, smishing, malicious apps, and social engineering tactics that traditional security tools miss. Without mobile threat intelligence, your organization is exposed to breaches that start at the human layer. Join our upcoming webinar to learn how to eliminate the blindspot and f...
Clean Data, Clear Mission: Powering Sec...
AI is changing how the federal mission gets done, but only if the data behind it is ready. Join AvePoint Public Sector and Bravo Consulting Group for a practical and engaging session designed for federal IT and data leaders. With the U.S. government now signing major deals with leading AI providers like Gemini, ChatGPT, Claude and Copilot, the pressure is on to make sure unstructured data is secure, clean and prepared for AI. In this webinar,...
Live Tech Demo Series
AWS and Carahsoft are offering live, in-depth technical demos every other Wednesday at 2:30pm ET. Our ongoing AWS technical demo series is designed to help you build better business applications in AWS for additional cost savings, performance efficiency, and best practices at scale. Join us for one, or as many 30-minute sessions as you'd like! Discover how your organization can maximize efficiency and innovation with AWS. Register now to learn...
Building Secure Containers for Public S...
Looking to boost your career in software development, cybersecurity or IT? Our hands-on Chainguard and AlphaBravo.io workshop, is your chance to gain or increase your skills in securing open-source container images. Whether you're a developer or just curious, you will learn to reduce software supply chain risk and meet container hardening requirements. Join Chainguard and AlphaBravo.io on October 1st to learn how to:Build secure-by-default con...
Strengthening Federal Cybersecurity wit...
In response to Executive Order 14028, federal agencies are accelerating their adoption of Zero Trust architectures to modernize and secure their IT environments. A critical yet often overlooked component of this transformation is Encrypted DNS, a foundational element that enhances visibility, control and resilience across distributed networks. Join Infoblox’s Chief DNS Architect, Cricket Liu, and Cybersecurity Strategist, Craig Sanderson...
Stronger Together: Modernizing Records...
Key topics include: “Why” – Applying lessons learned to state and local government challenges Benefits of adopting more Microsoft 365 tools for data governance Approach to implementing tools – Discover, Design, Migrate, Train, Maintain Tools available in the Microsoft 365 universe for data governance and security, including AvePoint add-on tools to improve functionality
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.