Event Date: May 24, 2017 at 12:00 PM EDT Hosted By: Palo Alto Networks, Sun Management & Carahsoft Location: Arlington, VA
Interested in taking a Palo Alto Networks box for a test drive? Palo Alto Networks and Sun Management invite you to take the Ultimate Test Drive Threat Prevention workshop. You will get hands-on experience with the Palo Alto Networks Enterprise Security Platform.This is ...
Event Date: May 25, 2017 at 2:00 PM EDT Hosted By: RSA, Assurance Data & Carahsoft
Join this webcast to learn how only RSA NetWitness can: Continuously monitor endpoints to detect anomalies and gather all forensic data needed for incident response and investigationsProvide a real-time, multilayered approach to detection and analysis isolated threats that other endpoint solutions ...
Event Date: June 01, 2017 at 2:00 PM EDT Hosted By: Trustwave & Carahsoft
This webinar will provide guidance on how to approach complying with the executive order issued on May 11, 2017 that requires all agencies to provide a risk management report to the Department of Homeland Security (DHS) and the Office of Management and Budget (OMB) within 90 days.
Event Date: June 07, 2017 at 11:00 AM EDT Hosted By: F5 Networks & Carahsoft Location: Virginia Beach, VA
Timelessly known for its superior defense, Sparta was known as one of the greatest cities without walls to ever be defended. Its walls were its mobile and highly trained units called Spartans. Often outnumbered in battle, their defensive techniques stood the test of time during their reign.Over the past ...
Event Date: June 08, 2017 at 8:00 AM EDT Hosted By: Infoblox & Carahsoft Location: Washington, DC
We will be covering security’s most important topics and discussing today’s largest DNS Attacks. Arguably, the most destructive cyberattacks use DNS — stealing computing power, exfiltrating sensitive information, holding files and devices for ransom, and causing severe destruction of critical services. DNS ...
Event Date: June 08, 2017 at 2:00 PM EDT Hosted By: Venafi & Carahsoft
Today's cyber security landscape is more complex and dynamic than ever, competing with resources to modernize federal IT infrastructure while keeping federal networks protected from the most advanced nation, state, and insider threats.Security teams are inundated trying to protect the ...
Event Date: June 22, 2017 at 8:00 AM EDT Hosted By: F5 Networks & Carahsoft Location: Washington, DC
Federal agencies are under constant threat from both traditional and Nation State Actors. Compounding that threat is trying to secure applications outside of the traditional private data center perimeter. The ability to deliver applications securely to anyone, anywhere, at any time is complex, especially while ...
Event Date: July 11, 2017 at 11:00 AM EDT Hosted By: F5 Networks & Carahsoft Location: Washington, DC
Join F5 Networks and Carahsoft for Session 2 of the Exploring F5 Seminar Series: Introduction to iWorkflow, iApps, and the Tenant Model.In Session 1 of the Exploring F5 Seminar Series we defined the framework for a variety of topics related to F5’s vision for cloud services and the new ...
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
ThreatStream provides the essential analysis and correlation that you need to translate raw, unstructured and duplicative data into true intelligence. Reduce the noise of false positives from outdated irrelevant data in minutes. What’s left is true insight in the form of pre-built rules, reports, ...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
Today’s evolving threat landscape makes it difficult for government agencies to
adequately detect and respond to increasingly sophisticated attacks. Perhaps the single
most challenging threat facing the United States government is the insider threat. Though
they occur with less frequency than t...
The Certes Enforcement Point (CEP) Variable Speed Encryptors (VSEs) are bandwidth customizable multi-layer encryption appliances that provide tunnel-less data protection, including Ethernet frame encryption for Layer 2 networks, IP packet encryption for Layer 3 networks, and Layer 4 data payload enc...
Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...