.png)
How AI is Driving Acquisition Readiness for Sea Systems
Speakers: Theresa Campobasso, Senior Vice President of Strategy
.png)
Self-Driving Ops- Reality or Fantasy?
Speaker: Josh Stageberg | VP of Product Management SolarWinds
For agencies to achieve fully autonomous operations, they must first achieve observability. Observability is vital to avoiding tool sprawl and alert fatigue, and it is built to expand visibility and deliver faster response times, preparing your tech stack for greater automated processes like self-driving ops.
• How self-driving ops can improve cost efficiencies, inform decision-making, plan resource requirements, enable interoperability, and ensure uninterrupted delivery of mission-critical services
• Why and how observability is a core tenet of self-driving ops, and how it can overcome challenges posed by IT complexity
• How agencies can best prepare their environments for AIOPs
• How to take a Secure by Design approach to observability and self-driving ops
Schedule conflict? Sign up , get a copy of the slides, and access the on-demand presentation after the webcast.
(1).png)
Ivanti: A Modern Unified Endpoint Management Experience
Speaker: Tyler Jaeger, Sr. ATS Sales Engineer – Public Sector, Ivanti
Time: 1:00pm ET
Explore how recent developments in the Unified Endpoint Management (UEM) industry may affect your organization and how Ivanti can assist in these efforts. Ivanti maintains its status as a leader in the UEM market with its products and capabilities around secured UEM. Ivanti tackles common problems in this market through enabling a convenient and secure end-user experience.
In this WEST 2024 webinar session, you will learn about:
- Ivanti accreditations and customers
- The state of the UEM market in 2024
- Ivanti's recent development within the UEM space
- Augmenting the UEM capability and migration capabilities
.png)
Setting Sail with DevSecOps: A Blueprint for Naval Transformation
Speaker: Shaun Jones, Head of Public Sector, Contegix | Alec Leeseburg, President, Velocity Explorations
Time: 1:00pm ET

Identity Security: The Core of Zero Trust
Speaker: Michael Saintcross, VP Federal | Frank Briguglio, Federal CTO, Sailpoint
Time: 2:00pm ET
The ever-growing threat of cyberattacks faced by the Department of Defense and every other organization is always the result of exploitable privilege as the essential attack technique required to escalate access and move laterally. Identities and their privileges are at the heart of almost every attack today.
Wednesday, March 6
Transformation at the Speed of the Mission!
Speaker: Carl Wright, Director Federal Sales | Adam McGuire, Senior Sales Engineer
Time: 1:00pm -1:40pm ET
• Understanding of What Digital Adoption is
• How WalkMe Discovery and Shadow AI work
• The importance of Digital Adoption to the Warfighter

Register Now to Unlock Cyber Resiliency Strategies
Speaker: Joe Kattner, Director of Systems Engineering
Time: 2:00pm ET
- Understand how to know your terrain better than your adversary
- Better understand adversaries motives and objectives
- Use deceptive practices to shape the attackers experience

Charting China's Climb as a Leading Global Cyber Power
Speaker: Jon Hall, Senior Intelligence Consultant
Time: 2:00pm ET
These operations have been influenced by internal factors like military restructuring and global cybersecurity dynamics and external factors, including public reporting and exposure by Western governments and the cyber threat intelligence community.
Join us on Wednesday, March 6th, at 2:00pm ET to discuss this evolution that has made it more challenging for organizations, governments, and the cybersecurity community to defend against these threats.
Tuesday, March 12
(1).png)
Bolstering Readiness with Secure, Automated Agreements
Speaker: Dan Reinhardt, Distinguished Solution Consultant | Griff Harrison, Regional Vice President, Public Sector
Time: 1:00pm ET
Throughout the Department of Defense (DoD) ecosystem, agreements are required to strengthen operations and maintain readiness. These agreements come in all shapes and sizes, including authorizations, correspondence, and forms.
To best meet the mission, defense agencies need speed, security, accuracy, and convenience in these documents and their related processes.
Join DocuSign and Carahsoft to learn how you can drive efficiencies on and off the battlefield and bolster readiness through end-to-end agreement management:
- Leverage current systems of record and data to generate and auto-populate electronic documents for signature
- Send electronic documents for signature via email or SMS, and capture electronic and digital CAC signatures
- Manage document data and store completed documents in systems of record
- Gain insight into signing, completion, and utilization metrics to drive predictive analytics
- Monitor security events and proactive protection against malicious threats in the agreement lifecycle
ON-DEMAND RECORDINGS
A Sailor's Experience from Recruitment to Retirement with Adobe
Speakers: Michelle Woolford and Diana Breen
Time: 1:00pm - 2:00pm ET
• Recruitment: Personalize relevant candidate experiences across online & offline channels to build trust, expand outreach, drive candidate engagement, an enhance brand.
• Hiring & Onboarding: Reduce paper and manual HR process with digitized and automated workflows, collaborative work management and signatures for speed-to-mission.
• Retention: Engage and develop employees to ensure robust support of the mission, increase job satisfaction and empower employees with personalized intranet and eLearning platforms.
• Retirement: Streamline offboarding & maintain a positive post-employment experience by supporting retirees with relevant benefits and continued connection.

Accelerating Zero Trust Through Deception-based Active Defense
Speakers: Suril Desai, VP, Engineering | John Maguire, SVP, Business Development, Partnerships and Alliances
Time: 10:00am - 11:00am PT

Fortifying the Digital Frontlines: Confidential Computing for National Security
Speakers: Dwayne Hoover, VP of Solutions Engineering | Zach Sutton, Director of Public Sector
Time: 2:00pm ET
Secure And Hunt At Scale: How The Armis Intelligence Center Aligns Supply Chain Risk With Threat Telemetry In A Single Feed
Speakers: Max Lewis, Principal Sales Engineer, Public Sector | Matthew Shallbetter, Client Executive
Time: 1:00PM ET
- Map supply chain risks
- Continuously monitor for threats
- Leverage real-time data for actionable insights
- Secure and hunt at scale in today's hyper-connected world

Year of the Dragon? Using OSINT for a Decision Advantage on China
Speakers: Frederick Kagan, VSenior Fellow and Director of the Critical Threats Project, American Enterprise Institute | Paul Becker, Rear Admiral, USN (Ret), CEO, The Becker T3 Group LLC | McDaniel Wicker, VP Strategy, Babel Street | Jason English, VP Business Development, Babel Street
Time: 3:00pm ET
- DIME power dynamics: An analysis of China's diplomatic, information, military, and economic initiatives and their interplay on the global stage
- The importance of the year of the dragon: Parallels between the characteristics of the year of the dragon and China's strategic approach and impact on international affairs
- OSINT/PAI: A deep dive into the efficacy of OSINT tools in gathering and analyzing publicly available information to decipher China's intentions
- Decision advantage: Understanding how military leaders can leverage OSINT to gain insights, anticipate actions, and ultimately maintain a decision advantage in response to China
- Perspectives from other Pacific nations, including Australia, on how they view China's evolving influence
AI in Cybersecurity: What the Pros (and Hackers) Know
Speakers: Shiladitya Sircar, SVP Product Engineering and Data Science | Adam Sloan, Technical Product Marketing Director
AI in Cybersecurity.
- During the webinar, experts from BlackBerry will share their insights on:
- The pros and cons of AI and generative AI applications in cybersecurity
- What to look for when evaluating AI-based business products
- How to weigh risk versus value when choosing AI-based security applications
CORAS Portfolio and Program Optimization for DoD Decision Management Now
Speakers: Dan Naselius, President & CTO CORAS | Gordon Irons, CORAS Customer Success
Time: 11:00AM ET
PMAs face significant challenges in accessing, communicating, and managing data due to multiple tools, stove-piped sources, and the need for sophisticated integration. DoD departmental decision management demands predictive algorithms, AI, and ML to support informed decision-making processes at the speed of relevance.
In this webinar on February 20, 2024 at 11 am, Carahsoft partner CORAS examines the unique needs of DoD PMAs and how leveraging its unique AI/NLP toolset they can deliver cohesive solutions to support real time agile decision management within departments, without displacing existing systems. We will look at some recent success stories to share how to integrate the full data picture for enterprise visualizations, extract root cause analysis from structured and unstructured documents, optimize information needed for conclusions from large datasets, and facilitate faster decision-making.
Other elements of the webinar will examine how PMAs can automate processes, synchronize program schedules from different sources, and transfer data into reports and presentations without manual processes. Model-based systems engineering, and advanced analytical tools can enhance the collection and analysis of test data. CORAS is a FedRAMP High SaaS also available on the NIPR/SIPR so bring your security questions in addition to questions on how to optimize your portfolios, track and manage numerous programs of record, and fully visualize portfolio and program relationships, conflicts or relevance.
Who's Minding the Keys to the Kingdom?
Speakers: Andrew Sheedy, Digital Security Consultant | David Low, Global Vice President of Professional Services
Cryptographic keys are some of your organization’s most precious assets, therefore it’s essential to know who is minding them. The value of any key is equivalent to the value of all the data it protects. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence.
In this webinar you will learn how to:
- Utilize HSMs to protect the keys you have stored in disparate locations
- Add a robust layer of security to prevent attacker from finding your keys
- Establish a root of trust in your organization by safeguarding and managing your cryptographic keys and processes in a certified hardware environment

Multi-Cloud Deep Observability: From The Enterprise Cloud To The Tactical Edge
Speaker: Carl Rios, Cloud Architect for Public Sector
Time: 1:00PM ET
- Access network traffic insights without blind spots through Gigamon's Deep Observability Pipeline
- Empower their mission to safeguard critical network infrastructure and assets with high-performance, next-generation network visibility
- Become agile for edge and tactical cloud network deployments
- Normalize and consolidate network traffic insights with one Visibility Fabric
- Derive continuous insights into the behavior and activity in their networks
Bridging the Largest Threat Visibility Gap: Addressing the Email Threat Landscape with Proofpoint Threat Intelligence
Speakers: Robert Biestman, Senior Manager, Threat Intelligence, Proofpoint | Garrett Guinivan, Senior Solutions Architect, Proofpoint | Chris Dawson, Threat Intelligence Lead, Proofpoint
Time: 1:30PM ET
Join Proofpoint and Carahsoft to explore visibility gaps experienced by too many government organizations facing threats in email and beyond. Because email sits so early in the kill chain, has such broad impacts across government organizations and provides such a large attack surface for threat actors, insights from email-based threats can help you "shift left" and transform everything from end user awareness training to defense-in-depth approaches.
This webinar will include specific use cases demonstrating how organizations like yours can use Proofpoint Threat Intelligence to improve detections and proactively prepare both users and your enterprise for emerging threats and social engineering tactics.
Attendees of this webinar will learn:
• A better understanding of the email threat landscape
• Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face
.png)
Establishing a Zero Trust Compliant Data Pillar
Speakers: Carmelo McCutcheon, Public Sector CTO | Subramanian Kartik, Global VP of Systems Engineering
Time: 1:00PM ET
In early 2022, the Office of Management and Budget (OMB) issued its Memorandum M-22-09 which required agencies to meet specific zero trust guidelines centered around five pillars; Identity, Devices, Network, Applications, and Data. This requirement now applies to all federal, defense, and intelligence agencies.
In this session we will take a closer look at the data pillar, and share how you can leverage the requirements of this pillar to protect against increasingly sophisticated and persistent threats.
Join experts from VAST Data & Carahsoft on Thursday February 22nd at 1:00PM ET for an interactive discussion about how IT professionals can leverage security features to establish a data pillar for zero trust that is both secure and compliant with OMB regulations.