Archived Events
Organizations of all sizes in the Defense Industrial Base (DIB) are in the process of preparing to comply with the Cybersecurity Maturity Model Certification (CMMC) 2.0., which requires DIB members managing Controlled Unclassified Information (CUI) to undergo third-party assessments based on all 110 practices of the National ...
Do you want to progress the analytical maturity of your organization, but don’t know where to start? Do you want to upskill your knowledge workers, making people more self-sufficient and productive? To support more timely decision-making, do you want accurate analysis to be completed sooner and to be ...
Every year, federal agencies dispense hundreds of billions of dollars in grants, loans, disaster relief, tax refunds, disability payments, insurance claims, pensions, and more. But the financial fraud, waste, and misuse of these program funds have resulted in billions lost along with diminishing citizen trust.
Managing and delivering data-driven services while meeting public demands is a clear challenge for governments – whether it’s self-service access to data, government transparency, or timely responses to services. But how can you manage and deliver data securely while meeting public ...
A zero trust architecture (ZTA) is an enterprise cybersecurity architecture that is based on zero trust principles and designed to prevent data breaches and limit internal lateral movement. In a zero trust environment, identity stores are a primary attack surface where any compromise of identity can create significant risk ...
In this webinar, Joe Paoletta, Senior Security Solutions Engineer at Rapid7 and Dan Quigley, Federal Account Executive at Rapid7, discussed why government security teams are leveraging Metasploit Pro to help their ...
F5, Tailwind, and Carahsoft attended a Tech on Tap at The Broken Barrel Tavern. F5's history of delivering enterprise-class security products extended into our new product offerings in F5 Distributed Cloud and securing APIs with F5's latest WAAP solutions.
In this Tech ...
The FedRAMP Authorization Act becoming law is a promising development for government agencies prioritizing security to reimagine old processes, workflows, and experiences. FedRAMP’s codification provides government agencies with easier ...
RegScale and Carahsoft invited individuals and their cybersecurity teams to align with the NIST Risk Management Framework’s emphasis on a continuous Authorization to Operate.
This webinar was joined by industry practitioners-turned-leaders Anil Karmel, ...
The Navy is paving the way forward for information technology modernization by rapidly transforming digital systems to evolve and deliver modern Naval capabilities in order to maintain a competitive edge while also meeting increasingly complex ...