Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

logo_splunk_1color_K.png
Splunk

How to Protect Unemployment Systems from Global Attackers & Fraudsters


Event Date: June 27, 2023
Hosted By: Splunk & Carahsoft

Today's higher education institutions are facing greater financial risk due to an increase in both internal and external fraud. While some institutions are using traditional security tools to detect certain types of fraud, the vast increase in the types of fraud requires a different approach to build out a comprehensive approach to detect a greater number of threats.

Splunk takes a different approach in that we not only focus on the detection of indicators of compromise but also use data to detect anomalies in usage patterns to increase the accuracy of those alerts.

Attendees joined us to learn more about the topic of fraud in higher education including:

  • What types of fraud are on the increase across higher education
  • An overview of how Splunk is used across higher education institutions today
  • How Splunk can be used to identify and stop fraud in your institution
  • A discussion on best practices for detecting fraud in both higher education customers and other fraud-sensitive business verticals like finance organizations

Fill out the form below to view this archived event.


Resources


Thales TCT Solutions for Ransomware Attack Prevention
Whitepaper

Thales TCT Solutions for Ransomware Attack Prevention

The National Cybersecurity Center of Excellence (NCCoE) under the auspices of the National Institute of Standards and Technology (NIST) released guidance on identifying and protecting assets against ransomware. The Cybersecurity Special Publication (SP) 1800-25 lays out the steps to having a comprehensive strategy around protecting assets. It also shows that there is no silver bullet to address the menace of ransomware.

Thales Trusted Cyber Technologies (TCT) data security and access management solutions provide some of the most essential components of the cybersecurity framework proposed by NIST to protect organizations against ransomware.


Fill out the form below to view this Resource.