Event Date: July 11, 2017 at 9:00 AM EDT Hosted By: Symantec & Carahsoft Location: Fort Meade, MD
Join Symantec + Blue Coat for a series of Cyber Defense Technical Exchange Meetings. These educational sessions targeting the Department of Defense will be hosted at Club Meade on July 11th and July 26th.Cloud Access Security Broker/
Event Date: July 11, 2017 at 11:00 AM EDT Hosted By: F5 Networks & Carahsoft Location: Washington, DC
Join F5 Networks and Carahsoft for Session 2 of the Exploring F5 Seminar Series: Introduction to iWorkflow, iApps, and the Tenant Model.In Session 1 of the Exploring F5 Seminar Series we defined the framework for a variety of topics related to F5’s vision for cloud services and the new ...
Event Date: July 13, 2017 at 11:00 AM EDT Hosted By: Accellion & Carahsoft
As government agencies embrace the OMB’s “cloud-first” directive and formulate their cloud strategy, it is crucial that organizations understand what systems will be used to securely share sensitive content internally and with other agencies, external partners, and constituents.
Event Date: July 19, 2017 at 7:30 AM EDT Hosted By: Symantec & Carahsoft Location: Washington, DC
Join Symantec on Wednesday, July 19th for Cyber on the Hill, an interactive seminar for local cyber security professionals covering the widespread threat of ransomware and what you can do to protect ...
Event Date: July 19, 2017 at 12:00 PM EDT Hosted By: Palo Alto Networks, VMware & Carahsoft Location: Salida, CA
Interested in taking a Palo Alto Networks virtualized next-generation firewall product for a test drive? Palo Alto Networks, VMware, and Carahsoft invite you to take the Ultimate Test Drive Virtualized Datacenter ...
Event Date: July 20, 2017 at 1:00 PM EDT Hosted By: SAP NS2 & Carahsoft
Join us to learn how you can increase battlefield situational awareness with multi-INT fusion and real-time analysis for a more complete Common Operating Picture. As content is gathered there is a high volume of incoming data in both structured and unstructured formats. Time is of the essence and manpower is ...
Event Date: July 25, 2017 at 2:00 PM EDT Hosted By: Proofpoint & Carahsoft
IT and Records Management teams struggle to retain, access, discover, and dispose of content in compliance with today's evolving regulations. Our FedRAMP-certified information archiving solution helps U.S. government ...
Event Date: August 11, 2017 at 2:00 PM EDT Hosted By: Akamai & Carahsoft
The federal IT environment has evolved dramatically in recent years. In particular, networks have become increasingly complex as more and more devices have been connected and the line between the physical and cyber world has blurred, creating a much larger attack surface. With that in mind, NIST has made ...
Event Date: June 22, 2017 Hosted By: Splunk & Carahsoft
Armed services agencies are faced with increasingly sophisticated digital threats that often go unseen by conventional security solutions. Agencies must harden and manage growing IT infrastructures to safeguard classified data and the systems that support operations, such as administrative processes and field missions. ...
In this webcast where attendees learned how others are approaching the ransomware problem and heard real-world advice on how to prepare and respond!The WannaCry global ransomware attack ripped through organizations in over 150 countries on May 13th and ...
Event Date: June 22, 2017 Hosted By: F5 Networks & Carahsoft Location: Washington, DC
Federal agencies are under constant threat from both traditional and Nation State Actors. Compounding that threat is trying to secure applications outside of the traditional private data center perimeter. The ability to deliver applications securely to anyone, anywhere, at any time is complex, especially while ...
Every minute counts in a security investigation, don’t you want to be sure your security team has what it needs to be as fast and effective as possible?Splunk and Palo Alto Networks can help. By feeding Palo Alto Networks data into Splunk and enriching it with context from across your ...
Attendees joined Splunk, along with Dr. Ron Ross, NIST Fellow, and Matt Coose, Founder & CEO, Qmulos, as they discussed how your organization can use current technologies to comply with the recently released
NetAbstraction provides secure, varied, and non-apparent network connectivity, a range of identity
management and persona attribution options to alter or reduce the cyber attack profile; support for
migration on customer activities to the cloud; and system designs to help control customer
F5 and Amazon Web Services (AWS) have partnered to help you rapidly deploy application workloads without incurring the capital expenditures of new infrastructure. AWS is both a pioneer and leader in the public cloud marketplace, providing customers with the ability to provision and deploy applicatio...
ThreatStream provides the essential analysis and correlation that you need to translate raw, unstructured and duplicative data into true intelligence. Reduce the noise of false positives from outdated irrelevant data in minutes. What’s left is true insight in the form of pre-built rules, reports, ...
I didn't know it at the time but my introduction to the security specialty of incident response occurred when I first read the book The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, by Clifford Stoll. The book goes into great detail of how Stoll combined his general curio...
The Center for Protection of the National Infrastructure (CPNI) and CERT-UK recently sponsored a white paper called Threat Intelligence: Collecting, Analyzing, Evaluating. The paper discusses the need for ensuring that intelligence collected be relevant for major security stakeholders in your organi...
Perimeter defenses are inadequate protection against today's advanced threats. Traditional signature-based approaches leave a gap as attackers continuously use new, hard-to-detect methods to compromise hosts, establish a hidden presence on target systems, and exfiltrate sensitive data out of organiz...
Today’s evolving threat landscape makes it difficult for government agencies to
adequately detect and respond to increasingly sophisticated attacks. Perhaps the single
most challenging threat facing the United States government is the insider threat. Though
they occur with less frequency than t...
The Certes Enforcement Point (CEP) Variable Speed Encryptors (VSEs) are bandwidth customizable multi-layer encryption appliances that provide tunnel-less data protection, including Ethernet frame encryption for Layer 2 networks, IP packet encryption for Layer 3 networks, and Layer 4 data payload enc...
Achieving the right balance of security – without compromising the user experience – is a challenge for many federal agencies. RSA® Adaptive Authentication solves this challenge by providing risk-based multi-factor authentication for government agencies, ensuring the integrity of every user log...