Wednesday, June 12
Threat Informed Cybersecurity
Speakers: Joe Wingo - Director of Strategy - DoD
Time: 1:00PM ET, 10:00AM PT
In a world of ever-growing networks, skyrocketing vulnerabilities, and an expanding array of cyber adversaries, addressing cybersecurity challenges continues to strain the workload of already overworked teams. The increase of software and system patches gains new heights each Tuesday, leaving us in a state of being perpetually behind. How do we secure our networks when the dam holding back the bad guys is springing leaks faster than we can fix them? Join us as we navigate a solution.
During this webinar, attendees will learn:
- About the power of threat intelligence when understanding risk to the network and risk to the organization
- What factors qualify threat intelligence as “good”
- How the application of threat intelligence allows you to prioritize cybersecurity mitigations
- How organizations can operationalize threat intelligence to maximize the effectiveness of limited resources and truly reduce risk to their networks and missions
Tuesday, June 18
Powering Content Velocity with Generative AI and Asset Management
Speakers: Diana Breen - Senior Solutions Consultant, Amy Taira - Adobe JELA Program Manager, Gary Reburn - Senior Adobe Product Specialist
Time: 1:00PM ET, 10:00AM PT
Join Adobe and Carahsoft for our 2024 TechNet Cyber Webinar to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies such as Adobe’s Firefly Generative AI capabilities.
How AI is Revolutionizing Government Compliance
Speakers: Travis Howerton - Co-Founder and CEO, Dale Hoak - Director of Information Security, Greg Elin - Principal OSCAL Engineer
Time: 2:00PM ET, 11:00AM PT
Regscale and Carahsoft are excited to invite you to join us in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt and collaborate in service of your mission goals by utilizing emerging technologies.
As the landscape of government regulatory compliance evolves at an unprecedented pace, navigating the labyrinth of regulations while maintaining operational efficiencies has become increasingly daunting. Staying ahead of the curve is no longer a luxury - it's a necessity. The manual and time-consuming nature of compliance processes often hinders progress, leading to inefficiencies and strained resources. Amidst these challenges, the need for innovative solutions has never been more pressing.
In this exclusive webinar, you will gain valuable insights into how AI technology is reshaping regulatory compliance, accelerating processes and shaping the future landscape of governance. Whether you're navigating complex regulations or aiming to stay ahead of emerging risks, this webinar is your opportunity to arm yourself with the tools and knowledge to succeed in today's dynamic regulatory environment.
Attendees of this webinar will learn how AI:
- Can overcome regulatory hurdles, especially in reaching cATO.
- Can accelerate compliance processes.
- Addresses compliance challenges.
Don't miss out on this complimentary opportunity to learn from industry experts and revolutionize your cybersecurity. Register now to secure your spot and embark on a transformative journey toward greater efficiency, effectiveness and compliance excellence! Please contact me with any questions. We look forward to seeing you!
Unmasking Cyber Shadows: Enhancing Cybercrime Investigations with AI-Driven OSINT
Speakers: Dan Mathews - Director - Worldwide Solutions Engineering, Stacey Meyer - Senior Director - Federal
Time: 3:00PM ET, 12:00PM PT
In the relentless battle against cybercrime, adversaries continuously refine their tactics, posing challenges to even the most sophisticated investigative methods.
Meet a powerful ally: Deep OSINT investigations, fueled by AI and tapping into the world's largest breach data lake collected from the surface, deep, and dark web. This innovative approach enables government agencies not only to identify criminals but also to expose synthetic or faked personas, disrupting cybercriminal operations on an unprecedented scale and restoring trust and security to digital landscapes.
Join us in this webinar to uncover how agencies can leverage deep OSINT to:
- Disrupt crime at its source by uncovering synthetic identities
- Conduct cybercriminal identity graphing to unveil threat actors at the individual level
- Achieve greater scalability and efficiency
- And more
Thursday, June 20
Combatting Emerging Threats: Proofpoint and BluVector
Speakers: Garrett Guinivan - Senior Solutions Architect - Proofpoint, Scott Miserendino - VP of Engineering for Cyber - DataBee
Time: 1:00PM ET, 10:00AM PT
The digital evolution is moving quick, and it’s easy to be overwhelmed and click (or scan) something you shouldn’t have. Join us for an exclusive webinar where experts from Proofpoint and BluVector will delve into the evolving threat landscape from each company's unique perspective, with a special emphasis on email and network threats. The focus will be on the most prevalent threats targeting federal customers, including:
- Deep Fakes and AI-driven Threats
- QR Code Attacks and Ecrime
- Social Engineering and Phishing Kits
Balancing AI With The Indispensable Human Element In Cybersecurity
Speakers: Michael Leland - Chief Cybersecurity Evangelist
Time: 1:00PM ET, 10:00AM PT
Artificial Intelligence is a pervasive part of our lives today. Cybersecurity teams and adversaries alike have learned to harness the speed and power of machines to strengthen their capabilities. Join us as we discuss how with machine learning becoming one of the most important tools of defense, leaders must learn to balance the overwhelming speed and accuracy advantage of AI alongside the need for measured and intuitive interactions with a real-world human element. During this complimentary webinar, attendees will learn:
- What these trends mean for the hands-on practitioner
- What happens when the velocity of innovation outpaces the capabilities of human intellect
- About the evolving role of automation in the effective practice of securing our digital world
Wednesday, June 26
The Future of AI in the Quantum Era
Speakers: Dennis Mandich - CTO and Co-Founder of Qrypt
Time: 1:00PM ET, 10:00AM PT
Autonomous, AI-enabled systems will be crucial in operating enterprise networks and critical infrastructure, but their reliability and effectiveness depend on communications security. The emergence of quantum computers threatens the data integrity of corporate, military, and intelligence networks, potentially making them vulnerable to sophisticated adversaries. Advanced nation-states may attempt to compromise sensitive AI-training data exported to cloud-based GPU clusters, which could then be deployed into targeted networks and cyber-physical systems.
As AI and quantum technologies rapidly advance, cybersecurity will increasingly rely on these near-future capabilities. Mitigating the risks of transferring data to AI platforms before they are obsolete is a critical first step. Quantum-secure architecture must integrate with new technologies like Nvidia DPUs to achieve higher security guarantees than typical business systems.
Thursday, June 27
End-of-Life IT & Spilled Data Raises Breach Risks
Speakers: Eddie Prothero - Sales Engineer, David Robinson - Federal National Account Manager
Time: 2:00PM ET, 11:00AM PT
Join Carahsoft and Blancco to hear how to redeploy government computer drives, assets, devices, and other hardware to lower costs and provide increased value to federal agencies. Whereas the stored data must be completely and permanently destroyed before devices change hands. Unneeded data in live environments must also be sanitized regularly to shrink your agency’s data attack surface. Without easy-to-use processes that securely erase federal data (including spilled data), sensitive information can rapidly spread across networks. It can also remain on equipment destined for physical destruction.
This webinar will cover End-of-Life Device Erasure & Active Data Erasure:
During this session, Eddie Prothero and David Robinson will address events that require sanitization:
- Hardware refreshes
- Records retention expirations
- Contract or project completions
- Overseas or emergency military movements
- Staff changes
- Data migrations
Tuesday, July 9
The Intelligent SOC: Fusion Methodology for the Modern Government
Speakers: John Pirc - Director of Product Line Management
Time: 12:00PM ET, 9:00AM PT
Join Netwitness and Carahsoft in the lead-up to TechNet Cyber 2024 to explore how your team can innovate, adapt, and collaborate to service your mission goals by utilizing emerging technologies.
Human actors, not computers, are behind cyber-attacks, highlighting the presence of poorly developed code and motivated adversaries as core cybersecurity challenges. As adversarial activity grows more sophisticated, defenders face escalating challenges compounded by resource constraints. To effectively combat these threats, defenders require advanced tools and capabilities that deliver high-quality intelligence from various sources.
Hear from John Pirc as he introduces the next generation of intelligence-driven detection and response capabilities. This session will explore:
- The need to move beyond traditional methods and adopt an intelligence fusion center approach.
- Insights into identifying and mitigating threats through intelligence tradecraft, advanced technology, and applied data science.
- The future of cybersecurity defense will look like against emerging threats. Don't miss out - register today!
Achieving Compliance without Compromise: Strategies for Secure Application Development
Speakers: Jay Ryan - U.S. Federal Government Program Manager
Time: 1:00PM ET, 10:00AM PT
Explore the delicate balance between meeting regulatory requirements and maintaining high-performance application development. This session will cover key compliance frameworks, practical approaches to achieving compliance without sacrificing agility, and how to future-proof your applications against evolving regulatory landscapes.