Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Splunk-New-Microsite-logo.png
Splunk

Automate STIG Compliance with Splunk + Evaluate STIG


Event Date: December 04, 2024
Hosted By: Splunk & Carahsoft

Splunk engineers that collaborated with NAVSEA personnel to ingest the outcomes from Evaluate STIG using a HEC Token, enabling the visualization of this data within Splunk. Join us to discover how to configure and visualize your Evaluate STIG data in Splunk.

Evaluate STIG is a software tool developed by NAVSEA to streamline the automation of system compliance documentation. It simplifies the labor-intensive manual tasks that analysts face when ensuring compliance. While benchmark scans can aid in checklist documentation, they often leave many items marked as "Not Reviewed," necessitating manual checks by administrators. This manual review process is not only prone to errors but also costly. Maintaining a robust cybersecurity posture is crucial for safeguarding DoD systems, the Warfighter, and operational readiness.

Attendes joined this webinar to learn how to:

  • Ingest Evaluate STIG data into Splunk
  • Configure the data and visualize within Splunk

Fill out the form below to view this archived event.


Resources


Identity is Key to Securing DoD Supply Chain
eBook

Identity is Key to Securing DoD Supply Chain

U.S. military leaders have grave concerns about security within their technology supply chain. Digital systems are inherently vulnerable to some level of cybersecurity risk. When those systems support national security, the risk is heightened and magnified.

The Defense Department is actively working to strengthen cyber resilience in its supply chain partners and across the Defense Industrial Base, or DIB. It’s raising the bar for aerospace and defense contractors through the continual evolution of CMMC, the Cybersecurity Maturity Model Certification.

Identity and access management stand at the core of the cyber resilience effort. In order to meet the challenge of CMMC, defense contractors can modernize their identity and access strategies, leveraging cloud and as-a-service offerings with an emphasis on Zero Trust.


Fill out the form below to view this Resource.