Event Date: May 02, 2017 at 7:30 AM EDT Hosted By: Adobe Location: Washington, DC
Join senior agency officials, technology leaders, and innovators for a full-day event on creating and delivering exceptional digital experiences in government.People today are more connected, more discerning, and more overwhelmed than ever before. So when they transition from a consumer to a ...
Event Date: May 09, 2017 at 8:00 AM EDT Hosted By: GAI, Nutanix, Splunk & Carahsoft Location: Reston, VA
Agencies today need a scalable solution that will effectively deal with growing machine data, handle multiple workloads, protect against new cyber threats, and meet compliance regulations. And they need it to be a simple and efficient way of obtaining a holistic view that will provide actionable insights ...
Event Date: May 11, 2017 at 2:00 PM EDT Hosted By: Bromium & Carahsoft
Virtualization is transformative, it has played a substantial role in shaping the way we do business today. It helped reduce costs in the datacenter and it gave birth to cloud computing. Virtualization has given organizations the ability to be agile and adapt quickly to customer needs.In the ...
Event Date: May 16, 2017 at 2:00 PM EDT Hosted By: Okta & Carahsoft
During this webcast we will discuss:The role of identity as an accelerator for digital transformation successHow the Okta Identity Cloud helps organizations around the world serve citizens better with increased security and reduced costWhy a cloud-based IT architecture is more ...
Event Date: May 17, 2017 at 2:00 PM EDT Hosted By: Dtex & Carahsoft
Join Dtex and Carahsoft for a complimentary webcast on May 17th to learn more about the key benefits of the Dtex User Behavior Intelligence Platform, including how it can help you:Fill the gap of endpoint visibility in your environmentDetect unusual data aggregation, privilege escalation, ...
Event Date: May 17, 2017 at 5:30 PM EDT Hosted By: Symantec & Carahsoft Location: Washington, DC
Join Symantec on Wednesday, May 17th for Cyber on the Hill, an interactive seminar for local cyber security professionals covering Symantec's Internet Security Threat Report (ISTR).Security professionals in Washington know the importance of staying one step ahead of the ...
Event Date: May 23, 2017 at 8:00 AM EDT Hosted By: F5 Networks & Carahsoft Location: Huntsville, AL
Join us for an F5 Federal SE Certification Boot Camp. During the training we will be covering all of the blueprint exam points for the F5 101 & 201 certification exams. These blueprint points are the basis for the exam content, and can be found on the
Event Date: May 24, 2017 at 12:00 PM EDT Hosted By: Palo Alto Networks, Sun Management & Carahsoft Location: Arlington, VA
Interested in taking a Palo Alto Networks box for a test drive? Palo Alto Networks and Sun Management invite you to take the Ultimate Test Drive Threat Prevention workshop. You will get hands-on experience with the Palo Alto Networks Enterprise Security Platform.This is ...
Event Date: June 07, 2017 at 11:00 AM EDT Hosted By: F5 Networks & Carahsoft Location: Virginia Beach, VA
Timelessly known for its superior defense, Sparta was known as one of the greatest cities without walls to ever be defended. Its walls were its mobile and highly trained units called Spartans. Often outnumbered in battle, their defensive techniques stood the test of time during their reign.Over the past ...
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
Today’s evolving threat landscape makes it difficult for government agencies to
adequately detect and respond to increasingly sophisticated attacks. Perhaps the single
most challenging threat facing the United States government is the insider threat. Though
they occur with less frequency than t...
The Certes Enforcement Point (CEP) Variable Speed Encryptors (VSEs) are bandwidth customizable multi-layer encryption appliances that provide tunnel-less data protection, including Ethernet frame encryption for Layer 2 networks, IP packet encryption for Layer 3 networks, and Layer 4 data payload enc...
Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...