Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.
Splunk engineers that collaborated with NAVSEA personnel to ingest the outcomes from Evaluate STIG using a HEC Token, enabling the visualization of this data within Splunk. Join us to discover how to configure and visualize your Evaluate STIG data in Splunk.
Evaluate STIG is a software tool developed by NAVSEA to streamline the automation of system compliance documentation. It simplifies the labor-intensive manual tasks that analysts face when ensuring compliance. While benchmark scans can aid in checklist documentation, they often leave many items marked as "Not Reviewed," necessitating manual checks by administrators. This manual review process is not only prone to errors but also costly. Maintaining a robust cybersecurity posture is crucial for safeguarding DoD systems, the Warfighter, and operational readiness.
Attendes joined this webinar to learn how to:
Fill out the form below to view this archived event.
With the new presidential cybersecurity Executive Order for Zero Trust issued for U.S. federal agencies to universally move to a zero trust architecture, agencies are scrambling to identify technologies to help them meet the new requirements. There’s one caveat, traditional zero trust architecture addresses network and applications security, not the data that sits behind them. Without applying the same principles of zero trust to the data behind the network it protects, we’re still in for the host of data breaches caused by what the security world calls ‘insider threats’. The term covers everything from insider spies and moles deliberately leaking information or selling it to the highest bidder, through to negligent office workers leaving a laptop on a bus or sharing a file with the wrong email address.
Fill out the form below to view this Resource.