Tuesday, October 31

Forward Networks logo

 

Improving Security With Cyber Penetration Testing

Speaker: Richard Harsell - Services Sales Manager, BlackBerry Public Sector, Daryl Whitlow - Penetration Testing Senior Consultant
Time: 2pm ET, 11am PT
CPE Eligible

This webinar will cover Cyber Penetration Testing including:

  • Identifying the types of gaps that can be uncovered
  • Understanding how penetration tests reduce risk
  • Addressing the challenges sometimes associated with conducting penetration tests
  • Exploring best practices and considerations for penetration tests
VIEW ON-DEMAND RECORDING
 

Thursday, November 2

TrendMicro logo

 

Vision One for Sovereign and Private Cloud: Solving Challenges of Detecting, Understanding and Responding to Complex Attacks

Speaker: David Abramowitz - Regional Technical Director, Federal
Time: 1pm ET, 10am PT
CPE Eligible

Attackers don’t stay in silos. They move throughout the environment and then it’s up to the security team to piece together viewpoints of the different silos to figure out what happened. And all of the parts of the environment generate a lot of noisy alerts that get sent to the SIEM. The analyst can see a lot of alerts, but they’re just alerts, not a detailed record of all activity, so they are missing important attack details, and the analyst is buried in alerts without context.

Join Trend Micro and Carahsoft on November 2nd for our webinar where attendees will learn how you can get increased visibility, use automated global and local threat intelligence generation & sharing, speed up mean time to detect and respond, centralize command for security operations, contextualize threats, and reduce noise, all in a single on-premise platform.

VIEW ON-DEMAND RECORDING

 

 

Thursday, November 9

BabelStreet logo

Securing Your Inner Circle: Mastering Insider Risk Management with Public Data Insights

Speaker: Hunter Jones - Account Executive, Mohamad El-Hamalawy - SVP Federal Civilian Sales, Patricia Stokes - Senior Executive Service Member (Ret.)
Time: 2pm ET, 11am PT
CPE Eligible

In today’s digital landscape, insider risks pose a growing threat to organizations and government agencies, impacting reputation, business continuity, and national security. This webinar focuses on insider risk management and the role of publicly available information (PAI) monitoring in strengthening security measures.

VIEW ON-DEMAND RECORDING

 

Wednesday, November 15

Cribl logo

Accelerating Detection & Response During Cyber Events

Speaker: Abby Strong - SVP of Customer Experience & Marketing
Time: 11am ET, 8am PT
CPE Eligible

This federal law enforcement agency, like many others, was inundated with data from multiple sources in multiple formats, slowing down the ability to detect and respond to breaches and hunt for new cyber threats.

Attendees will learn how this agency accelerated cybersecurity investigations by:

  • Addressing timestamp challenges to ensure accurate investigative timelines and ensure accurate IP geolocation
  • Reducing reliance on TAs and configuration files to minimize low-value, repetitive work for your team
  • Enriching data with geoIP functions and known intelligence, giving investigators better, more relevant data to search through or simply pointing investigators in a better direction
  • Enabling investigators to see the right formats and types of data faster, with the right context, in their preferred analytical tool

VIEW ON-DEMAND RECORDING

Atlassian logo

 

Speaker: Navin Vembar - Senior Principal Engineer, Atlassian
Time: 1pm ET, 10am PT
CPE Eligible

For federal agencies, achieving mission success increasingly hinges on modernizing legacy systems and transforming operations. So it’s no surprise that a growing number of government programs and IT departments are turning to DevSecOps software development methodologies. Yet, with any major change comes challenges, and not every federal agency is using DevSecOps to its full potential. Discover how adopting DevSecOps not only securely enhances your agency’s delivery but transforms your agency’s culture to be ‘security-first’.

VIEW ON-DEMAND RECORDING

 

 

Zebra logo

 

Speaker: Michelle Kabele - Sr. Manager, Channel Marketing - Emerging Markets & Technology, Chris Sullivan - Regulated Industries Global Strategy Lead
Time: 2:30pm ET, 11:30am PT
CPE Eligible

With cyberattacks increasing in quantity and sophistication it is becoming ever-more-important for all government entities to develop a pro-active and resilient data security risk management strategy. Developing a focused approach specific to edge computing environments is increasingly important because frequently these areas can pose the most significant levels of security risk as they are not fully encompassed by the organization’s perimeter. (1) In this session we will discuss why this is such an important area of cyber security focus and share key insights to help inform government entity decision making processes.

VIEW ON-DEMAND RECORDING

Thursday, November 30

Yubico logo

Securing the DoD and the Intelligence Communities with Zero Trust and phishing-resistant MFA

Speaker: Alex Antrim - Senior Solution Engineer
Time: 2pm ET, 11am PT
CPE Eligible

Zero Trust is vital to maintain robust data security and easy information sharing across the Department of Defense (DoD) and intelligence communities. Previously, DOD professionals relied upon issuance of credentials stored on single-protocol smart cards, creating UX complexity, an increased cost of supporting devices, and limited usage across devices and systems. Zero Trust and phishing-resistant multi-factor authentication (MFA) are quickly becoming the new bulwark against modern cyber threats, including emerging quantum threats.

To optimize information sharing, provide robust data protection, and ensure that agencies continue to safeguard the nation’s most sensitive information, a Zero Trust security model with a strong identity credentialing and access management (ICAM) stack that supports secure credential issuance on an AAL3 phishing-resistant authenticator, is key. Each of these requirements would be supported by an approved multi-protocol, multi-factor, AAL3 hardware authenticator that has a valid FIPS 140-2 certification.

This session will describe the value of modern authentication, phishing-resistant protocols, and how hardware-based multi-protocol authenticators can secure users across the DoD and Intelligence Communities.

VIEW ON-DEMAND RECORDING

Proofpoint logo

Zero Trust In An Encrypted World

Speaker: Stephen Goudreault - Cloud Security Evangelist
Time: 1pm ET, 10am PT
CPE Eligible

 

The Zero Trust journey should have a plan. Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and techniques over and over again. In this presentation, we will briefly examine two top models and then explore what that means on a practical level. We will broadly look at some traditional network visibility solutions and challenge some of the norms around these systems. Do they really solve the problem in the best way in a world where everything is encrypted and threat actors hide in plain sight?

Key takeaways:

  • Do you have a Zero trust plan?
  • How can we address the ‘no single source of truth’ concept in Zero Trust?
  • Can classic tools such as logging really solve for the visibility gap?
  • How to deal with the encryption/decryption paradox?
  • What method can solve for lateral visibility?

VIEW ON-DEMAND RECORDING

Tuesday, December 5

Oracle Cloud logo

Unlock Decision Advantage with Real-Time Insights from the Tactical Edge

Speaker: Peter Guerra - Global Vice President, Data & AI, Josh Tatum - Sr. Cloud Engineer
Time: 12pm ET, 9am PT
CPE Eligible

Through real-world DoD and IC use cases, Oracle examines the most advanced capabilities for capturing and leveraging data at the tactical edge. Oracle Roving Edge infrastructure enables real-time decision making, even in the most austere environments with intermittent communications. Join our complimentary webinar with Oracle to discuss the latest strategies and innovations that enable the warfighter with decision advantage at the tactical edge. Oracle experts will explore the latest edge compute, AI, and security technologies that empower the warfighter to maintain situational awareness and improve split-second decision.

Specifically, attendees will learn:

  • Innovations in ruggedized cloud devices that seamlessly deliver cloud computing, storage, and network to facilitate data collection, analytics, and decision-making at the edge in disconnected locations
  • How to deploy trained AI and geospatial models from the edge to the enterprise
  • Real-world examples of edge infrastructure leveraging geospatial AI algorithms
Learn how to stay at the forefront of cloud edge technologies to achieve mission success across classification levels – register now!
 

VIEW ON-DEMAND RECORDING

Dynatrace logo

Harnessing Observability: Illuminating the Path from Chaos to Strategic Advantage

Speaker: Matt Gardner - Sr Public Sector Solution Engineer
Time: 1pm ET, 10am PT
CPE Eligible

In the era of strategic competition, the ability to leverage emerging technologies is crucial to gain intelligence and a strategic advantage. As information volumes continue to exponentially increase, agencies must make sense of this data at the speed of mission.

Join Dynatrace online the week before DoDIIS 2023 to explore how enhanced observability is enabling government teams effectively manage and understand their complex IT environments, transforming chaos into clarity.

Dynatrace provides agencies with precise answers via intelligent automation and the solutions needed to accomplish the objectives of a Zero Trust architecture with AI-enabled continuous observability, analytics, automation and orchestration.

Tune in live to hear how U.S. federal agencies are leveraging Dynatrace for:

  • Full-stack observability and visibility within applications and infrastructure
  • Continuous monitoring across cloud and hybrid environments
  • Automated problem resolution at scale with root cause analysis
  • The foundation of a modern Zero Trust architecture

VIEW ON-DEMAND RECORDING

Wednesday, December 6

Tetrate logo

Simplify Kubernetes and MultiCloud Complexity with the Service Mesh

Speaker: Branden Wood - Head of Federal Sales
Time: 1pm ET, 10am PT
CPE Eligible

In this webinar, we will review service mesh fundamentals, how the mesh simplifies Kubernetes security and present a live demo of Tetrate Service Bridge. The goal of service mesh implementation is to make managing applications deployed in Kubernetes easier. A service mesh complements Kubernetes by providing a more scalable, flexible and manageable solution for inter-service communication, traffic control, observability and security in a microservices architecture. It reduces the operational burden on DevOps teams making it easier to implement application modernization and Zero Trust strategies.

VIEW ON-DEMAND RECORDING

Proofpoint logo

Harnessing Knowvation CSP for Geospatial Advancements & AI Insights

Speaker: Sarah De La Cruz - Partner Solutions Architect, Amazon Web Services (AWS), John Yokley - President & CEO, John Fanguy - VP Sales & Marketing, Jon Sievert - Senior Account Executive, Karl Garcia - Engineering Manager
Time: 1pm ET, 10am PT

Join PTFS, AWS and Carahsoft for an insightful webinar to explore the cutting-edge capabilities of PTFS’s Knowvation platform. Dive into case studies and topics including AI/ML text extraction, image and video recognition, and the integration of the Knowvation CSP with AWS.

VIEW ON-DEMAND RECORDING

 

RegScale logo
 

Simplify Kubernetes and MultiCloud Complexity with the Service Mesh

Speaker: Larry Whiteside - Chief Information Security Officer, Travis Howerton - Co-Founder & Chief Executive Officer
Time: 2pm ET, 11am PT
CPE Eligible

In the fast-evolving ecosystem of the Department of Defense, the way we perceive and manage compliance requirements is undergoing a paradigm shift. Compliance as Code emerges as the frontrunner to challenge traditional, manual vetting methods.

Modern practices directly embed these prerequisites into infrastructure and application development processes. This offers the unique advantage of automated evidence collection, streamlining security reviews, and compliance. Join us for this webinar to explore how to redefine audit readiness and bridge development, security and compliance in the DoD.

In this webinar, you will learn from industry leaders how to:

  • Decode Compliance as Code and its implications for the DoD
  • Understand the limitations of traditional compliance in product development
  • Harness the power of real-time coding to automate compliance checks in DoDIIS
  • Integrate Compliance as Code into DoDIIS environments

VIEW ON-DEMAND RECORDING

RegScale logo
 

Intelligent Process Automation

Speaker: John Beglan - Kofax Director of Sales Federal,  Tim Brocker - Senior Sales Engineer,
Time: 3pm ET, 12am PT
CPE Eligible

 

Kofax and Carahsoft are excited to invite you to download this webinar in partnership with upcoming DoDIIS 2023 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies.

During this webinar, attendees listened to subject matter experts discuss: 

  • Kofax and what intelligent process automation solutions Kofax provides to the Federal Government
  • The Kofax platform components used in variety of use cases in particular FOIA

VIEW ON-DEMAND RECORDING

Thursday, December 7

EDB logo

Defense Grade Security with EDB Postgres

Speaker: Jeremy Wilson, CTO - North America Public Sector
Time: 1pm ET, 10am PT
CPE Eligible

As the global leader in Enterprise-grade Postgres, EDB empowers the United States Federal Government by delivering innovative, high-performant, cost-effective database management solutions with a focus on national security and regulatory compliance. We propel government agencies forward with data-driven insights, elevated governance, and operational innovation harnessing the Power of Postgres, the most widely adopted open-source database in the world.

EDB is committed to ensuring its products are held to the highest security standards and meet the needs of federal, state, and local Government regulatory requirements. EDB understands the critical significance of adhering to standards such as the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), National Institute for Standards & Technology (NIST) Federal Information Processing Standard (FIPS), Center for Internet Security (CIS) Benchmark, and many other requirements. EDB ensures the implementation of these security best practices through approved DISA STIGs, FIPS encryption libraries, and CIS benchmarks as well as the ability to implement these automatically using EDB deployment tools.

In this webinar, you will learn how to leverage security best practices and benchmarks that have been approved by the United States Federal Government and reviewed by industry experts to take the guesswork out of securing database systems like Postgres. This significantly reduces the risks involved with running Postgres in mission-critical and regulated environments. You will also learn about additional advanced security features built into EDB Postgres such as Transparent Data Encryption (TDE), Transparent Column Level Encryption (TCE), Database Encryption, Role-based Access Control, and others.

VIEW ON-DEMAND RECORDING

Proofpoint logo

Elevating Governmental Security: Insights From Threat-Informed Security Awareness Education

Speaker: Doug Palermo - Senior Sales Engineer Proofpoint Security Awareness and Training Platform, Garrett Guinivan - Proofpoint Senior Sales Engineer
Time: 1:30pm ET, 10:30am PT
CPE Eligible

Every organization has different roles, specialties and risks, so why train them all the same?

The world of cybersecurity is no different- in fact, every user has an increasingly critical role in keeping agencies safe. So why do we issue all our users the same cybersecurity awareness training education?

The new wave of building a cyber-focused and resilient workforce is anchored in:

  • Delivering tailored and realistic awareness training to your users based on the sophisticated threats they're being attacked with.
  • Avoiding standard, archaic 'gotcha' phish simulation or the easy to recognize simulations about a Nigerian prince asking for money.

Join us for an interactive webinar and discussion of strategies for how Proofpoint helps you spark the union of informed threat data and meaningful user behavior change, allowing you to create threatinformed training for your users, rooted in real threats they see 'in the wild' for lasting behavior change. 

VIEW ON-DEMAND RECORDING

Veeam logo

Looking at Clouds from Both Sides: Protecting Containerized Workloads in Hybrid Infrastructures

Speaker: Balaji Subramaniam - Director of Information Technology - Application Development, Matt Slotten - Principal Solutions Architect

Time: 2pm ET, 11am PT
CPE Eligible

We invite you to an exclusive webinar that delves into the critical intersection of Kubernetes, containerized applications and the unique challenges faced by government and education IT professionals.

During this webinar, industry and public sector experts will:

  • Explore how Kubernetes serves hybrid infrastructures
  • Discuss their approaches to data security within containerized workloads
  • Debunk common myths surrounding Kubernetes and cloud security
  • Highlight best practices for protecting sensitive data within containerized workloads
  • Develop strategies for effectively communicating IT needs to key stakeholders 
Don't miss this opportunity to enhance your understanding of Kubernetes security and contribute to the robustness of your agency's IT infrastructure. We hope to see you there!
 
VIEW ON-DEMAND RECORDING
 

Wednesday, January 10

BabelStreet logo

Modernizing Digital Experience with Content Velocity

Speaker: Tyson Bowman - Senior Solutions Consultant, Scott Feinstein - Director of Sales, Adobe Systems Federal Organization
Time: 1pm ET, 10am PT
CPE Eligible

Content velocity is more important than ever as agencies strive to continuously deliver effective digital experiences and compelling content across a diverse landscape of devices and through multiple channels. The ability to create, find, and deliver the right digital assets, for the right context, at the right time is crucial to successfully engaging your audience. Join our webinar with Adobe and Carahsoft, Modernizing Digital Experience with Content Velocity, where we unveil the strategies to supercharge your content creation using Adobe Experience Manager (AEM). Mastering the features of AEM demonstrated in this session equips you with practical insights for faster, more efficient content workflows. Whether you're a seasoned AEM user or a beginner, discover how to harness AEM's power for unparalleled content velocity.

REGISTER NOW

Thursday, January 11

ForgeRock Ping Identity logo

Accelerating Authorization Capabilities for Centralized, DDIL, and Tactical ICAM (TICAM) Environments

Speaker:  Bryan Rosensteel, U.S. Federal CTO, Ping Identity
Time: 1pm ET, 10am PT
CPE Eligible

ABAC, PBAC, CBAC, oh my! Identity, Credential, and Access Management (ICAM) is the set of tools, policies, and systems that an agency uses to enable the right individual to access the right resource, at the right time, for the right reason in support of federal business objectives. Fine-grained access control is how to implement these requirements within a modern Zero Trust architecture.


Hear from Bryan Rosensteel, Ping Identity’s US Federal CTO, on how to leverage authorization to enforce who/what has access to data and resources and who does not, without having to rewrite your applications or data.

REGISTER NOW

 

 

ForgeRock Ping Identity logo

Automating Compliance and Security in a Multi-Platform World

Speaker: Tim Olson, Sr. Solutions Engineer
Time: 3pm ET, 12pm PT
CPE Eligible

 

As technology advances and cyber threats evolve, agencies must strategically adapt their security posture. Join HashiCorp experts on January 11 to delve into HashiCorp's advanced automation techniques that can help your agency ensure robust IT security and compliance across platforms.

Tune in live to gain insights into:

  • Understanding the importance of compliance and security automation
  • Exploring HashiCorp Vault, Boundary and Consul to create a Zero Trust Architecture
  • Implementing practical solutions for multi-platform compliance and security

REGISTER NOW

 

Thursday, Feburary 22

 

 
BabelStreet logo

VAST Data Webinar: Establishing A Zero Trust Compliant Data Pillar

Speaker: Carmelo McCutcheon - Public Sector CTO, Subramanian Kartik - Global VP of Systems Engineering

Time: 1pm ET, 10am PT
CPE Eligible

In early 2022, the Office of Management and Budget (OMB)  issued its Memorandum M-22-09 which required agencies to meet specific zero trust guidelines centered around five pillars; Identity, Devices, Network, Applications, and Data. This requirement now applies to all federal, defense, and intelligence agencies.

In this session we will take a closer look at the data pillar, and share how you can leverage the requirements of this pillar to protect against increasingly sophisticated and persistent threats.

Join experts from VAST Data & Carahsoft on Thursday February 22nd at 1:00PM ET for an interactive discussion about how IT professionals can leverage security features to establish a data pillar for zero trust that is both secure and compliant with OMB regulations.

VIEW ON-DEMAND RECORDING

Alteryx logo

Transforming Geospatial Analytics: Meeting Today's Data Challenges and Opportunities

Speaker: Kevin Sowers, Consulting Sales Engineer, Alteryx
Time: 2pm ET, 11am PT
CPE Eligible

Traditionally, geospatial analytics has been associated with GIS specialists and specialized systems. However, the landscape is evolving rapidly. With the increasing availability of third-party spatial data, such as satellite imagery, organizations are recognizing the importance of harnessing spatial analysis and incorporating it into their descriptive, predictive, and prescriptive workflows.

REGISTER NOW