WEST 2024 WEBINAR SERIES: PARTICIPATING PARTNERS
 
 
 
 
Solarwinds logo

 

How AI is Driving Acquisition Readiness for Sea Systems

Speakers: Theresa Campobasso, Senior Vice President of Strategy

This webinar will explore the current state challenges for acquisition readiness specific to sea systems, including both internal and external risks from geopolitical tensions, catastrophic weather events, and rapidly changing policy compliance to resilience factors like diminishing manufacturers, critical materials shortages, and other supplier ecosystem risks.  After mapping out the biggest factors to consider in 2024, we’ll cover the opportunities that AI and emerging technology capabilities bring to these problem sets as public and private stakeholders look for ways to stay ahead of these challenges through examination of case studies and a demonstration of AI enabled acquisition risk management in action. 
 
 
 
 
 
 
 
 
Solarwinds logo

 

Self-Driving Ops- Reality or Fantasy?

Speaker: Josh Stageberg | VP of Product Management SolarWinds

Self-driving operations will create a world where DoD IT pros can rely on artificial intelligence to expedite decision-making and free up time to focus on top operational priorities.
For agencies to achieve fully autonomous operations, they must first achieve observability. Observability is vital to avoiding tool sprawl and alert fatigue, and it is built to expand visibility and deliver faster response times, preparing your tech stack for greater automated processes like self-driving ops. 
 
Register now  to hear from Joshua Stageberg, VP of Product Management at SolarWinds, who will explore
•    How self-driving ops can improve cost efficiencies, inform decision-making, plan resource requirements, enable interoperability, and ensure uninterrupted delivery of mission-critical services
•    Why and how observability is a core tenet of self-driving ops, and how it can overcome challenges posed by IT complexity 
•    How agencies can best prepare their environments for AIOPs
•    How to take a Secure by Design approach to observability and self-driving ops

Schedule conflict? Sign up , get a copy of the slides, and access the on-demand presentation after the webcast.
 
Thanks, and we hope to see you there!
 
 
 
 
 
 
Solarwinds logo

 

Ivanti: A Modern Unified Endpoint Management Experience

Speaker: Tyler Jaeger, Sr. ATS Sales Engineer – Public Sector, Ivanti

Time: 1:00pm ET

 
Ivanti and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. 
 
Explore how recent developments in the Unified Endpoint Management (UEM) industry may affect your organization and how Ivanti can assist in these efforts. Ivanti maintains its status as a leader in the UEM market with its products and capabilities around secured UEM. Ivanti tackles common problems in this market through enabling a convenient and secure end-user experience.
 
In this WEST 2024 webinar session, you will learn about:
  • Ivanti accreditations and customers
  • The state of the UEM market in 2024
  • Ivanti's recent development within the UEM space
  • Augmenting the UEM capability and migration capabilities
 
 
 
 
 
 
Solarwinds logo

 

Setting Sail with DevSecOps: A Blueprint for Naval Transformation

Speaker: Shaun Jones, Head of Public Sector, Contegix | Alec Leeseburg, President, Velocity Explorations 

Time: 1:00pm ET

Join Atlassian for an insightful webinar on DevSecOps implementation, focusing on establishing agile cross-team communication standards. Our expert speakers will delve into implementing DevSecOps in Project Blue before digging into how digital tools like Jira Software and Confluence make the workflow a reality.
 
We will explore common challenges along the DevSecOps journey, including issues of ownership, toolset adoption and workforce distribution, and how agencies can overcome them without sacrificing seamless collaboration. We will then cover the critical role Confluence can play in stakeholder management, centralizing documentation, and defining ownership structures, as well as how Jira integrations enable efficient tracking, prioritization and risk mitigation across initiatives.
 
Attendees will discover the total value of DevSecOps and the power of Atlassian tools. Don't miss this opportunity to glean actionable strategies for your DevSecOps initiatives.
 
 
ON-DEMAND RECORDING - COMING SOON
 
 
 
 
 
Solarwinds logo

 

Identity Security: The Core of Zero Trust

Speaker: Michael Saintcross, VP Federal | Frank Briguglio, Federal CTO, Sailpoint

Time: 2:00pm ET

 
BeyondTrust, SailPoint, and Carahsoft are excited to invite you to join us after WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. 
 
The ever-growing threat of cyberattacks faced by the Department of Defense and every other organization is always the result of exploitable privilege as the essential attack technique required to escalate access and move laterally. Identities and their privileges are at the heart of almost every attack today.
 
A higher degree of Privileged Access protection is required to reduce and eliminate privilege exploitability. Privilege access threat vectors are expanding across the Cloud, Applications, Endpoints, Servers, and 3rd party access points. Identity-based policies to enforce the principle of least privilege are required in all threat vector contexts, granting users the minimum level of access necessary for their roles, without reducing speed or capabilities. 
 
Join us on March 5th at 2PM ET for a discussion around identity, credential, and access management (ICAM) solutions that are core to a zero-trust strategy.
 
 
 
 
 

Wednesday, March 6

 
Solarwinds logo

 

Transformation at the Speed of the Mission!

Speaker: Carl Wright, Director Federal Sales | Adam McGuire, Senior Sales Engineer

Time: 1:00pm -1:40pm ET

Digital Adoption:
•        Understanding of What Digital Adoption is
•        How WalkMe Discovery and Shadow AI work
•        The importance of Digital Adoption to the Warfighter
 
 
 
 
 
 
 
Solarwinds logo

 

Register Now to Unlock Cyber Resiliency Strategies

Speaker: Joe Kattner, Director of Systems Engineering 

Time: 2:00pm ET

Join us following WEST 2024, to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies, courtesy of Fidelis and Carahsoft.
 
In the past few years NIST, CISA, and others have begun discussing cyber resiliency. What does this mean to you and your organization?
 
Register now to hear from Fidelis' Director of Systems Engineering, Joe Kattner as he discusses the shift in thinking to cyber resiliency and how this aligns with an open XDR solution so you can:
  • Understand how to know your terrain better than your adversary
  • Better understand adversaries motives and objectives
  • Use deceptive practices to shape the attackers experience
 
 
 
 
 
Solarwinds logo

 

Charting China's Climb as a Leading Global Cyber Power

Speaker: Jon Hall, Senior Intelligence Consultant 

Time: 2:00pm ET

Recorded Future and Carahsoft are excited to invite you to join us subsequent to WEST 2024 to explore how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. 
 
Over the last five years, Chinese state-sponsored cyber operations have transformed, emerging as a more mature, stealthy, and coordinated threat than in previous years, exemplified by the exploitation of zero-day vulnerabilities and advanced operational security measures.

These operations have been influenced by internal factors like military restructuring and global cybersecurity dynamics and external factors, including public reporting and exposure by Western governments and the cyber threat intelligence community.

Join us on Wednesday, March 6th, at 2:00pm ET to discuss this evolution that has made it more challenging for organizations, governments, and the cybersecurity community to defend against these threats.
 
 
 
 
 
 
 

Tuesday, March 12

 
Solarwinds logo

 

Bolstering Readiness with Secure, Automated Agreements

Speaker: Dan Reinhardt, Distinguished Solution Consultant | Griff Harrison, Regional Vice President, Public Sector

Time: 1:00pm ET

DocuSign and Carahsoft are excited to invite you to an upcoming webinar after WEST 2024. We will continue our discussions on how your team can innovate, adapt, and collaborate in service of your mission goals by utilizing emerging technologies. 

Throughout the Department of Defense (DoD) ecosystem, agreements are required to strengthen operations and maintain readiness. These agreements come in all shapes and sizes, including authorizations, correspondence, and forms.
 
To best meet the mission, defense agencies need speed, security, accuracy, and convenience in these documents and their related processes.

Join DocuSign and Carahsoft to learn how you can drive efficiencies on and off the battlefield and bolster readiness through end-to-end agreement management: 
  • Leverage current systems of record and data to generate and auto-populate electronic documents for signature
  • Send electronic documents for signature via email or SMS, and capture electronic and digital CAC signatures
  • Manage document data and store completed documents in systems of record
  • Gain insight into signing, completion, and utilization metrics to drive predictive analytics 
  • Monitor security events and proactive protection against malicious threats in the agreement lifecycle
 
 
 
 
 
 

ON-DEMAND RECORDINGS

 
 
 
 
Solarwinds logo

 

A Sailor's Experience from Recruitment to Retirement with Adobe

Speakers: Michelle Woolford and Diana Breen 

Time: 1:00pm - 2:00pm ET

Within the DoD, it is crucial to recruit the right talent to meet mission critical objectives. The problem is that the DoD is competing for the same talent as the private sector. The proper digital experiences enhances the ability to attract and retain that talent for the long haul.
 
Adobe is currently working across the DoD for the following ways to improve digital experiences:
 
•        Recruitment: Personalize relevant candidate experiences across online & offline channels to build trust, expand outreach, drive candidate engagement, an enhance brand.
•        Hiring & Onboarding: Reduce paper and manual HR process with digitized and automated workflows, collaborative work management and signatures for speed-to-mission.
•        Retention: Engage and develop employees to ensure robust support of the mission, increase job satisfaction and empower employees with personalized intranet and eLearning platforms.
•        Retirement: Streamline offboarding & maintain a positive post-employment experience by supporting retirees with relevant benefits and continued connection. 
 
 
 
 
 
 
Solarwinds logo

 

Accelerating Zero Trust Through Deception-based Active Defense

Speakers: Suril Desai, VP, Engineering | John Maguire, SVP, Business Development, Partnerships and Alliances

Time: 10:00am - 11:00am PT

Zero Trust is a strategy and architectural principle to ensure that only authorized users gain access to relevant applications and data. For a Zero Trust strategy to be effective, deception-based Active Defense is a foundational element. Active Defense is a proactive approach to cybersecurity that enables predicting the attacker’s actions, setting relevant traps for the attacker and observing for attacker interaction with the traps.
 
In this webinar, attendees will learn:
 
* How advanced attacks bypass traditional security to gain unauthorized access to critical systems and sensitive data
* Why early threat detection is essential to preventing attack propagation
* How deception protects the pillars of Zero Trust
 
 
 
 
 
Solarwinds logo

 

Fortifying the Digital Frontlines: Confidential Computing for National Security

Speakers:  Dwayne Hoover, VP of Solutions Engineering | Zach Sutton, Director of Public Sector

Time: 2:00pm ET

Anjuna provides high-value security with minimum complexity, making it simple to protect data and ensure data integrity. Anjuna’s webinar will touch on the importance of confidential computing, customer use cases, and a demonstration of cloud security posture.
 
 
 
 
 
Solarwinds logo

 

Secure And Hunt At Scale: How The Armis Intelligence Center Aligns Supply Chain Risk With Threat Telemetry In A Single Feed

Speakers: Max Lewis, Principal Sales Engineer, Public Sector | Matthew Shallbetter, Client Executive

Time: 1:00PM ET

In today's connected world, unseen threats like compromised vendors, malware and vulnerable devices hide within your supply chain. Managing this vast attack surface feels impossible. Enter the Armis Intelligence Center.
 
Armis Intelligence Center unifies global threat intelligence with real-time data on every device, from IT to OT and IoT. Get deep insights into vendor security, compromised components and ongoing threats. Proactively hunt threats across your entire network, eliminating blind spots.
 
During this complimentary webinar, you'll learn how to:
  • Map supply chain risks
  • Continuously monitor for threats
  • Leverage real-time data for actionable insights
  • Secure and hunt at scale in today's hyper-connected world
Register now and gain the upper hand to stop struggling with siloed security.
 
 
 
 
 
Solarwinds logo

 

Year of the Dragon? Using OSINT for a Decision Advantage on China

Speakers:  Frederick Kagan, VSenior Fellow and Director of the Critical Threats Project, American Enterprise Institute | Paul Becker, Rear Admiral, USN (Ret), CEO, The Becker T3 Group LLC | McDaniel Wicker, VP Strategy, Babel Street | Jason English, VP Business Development, Babel Street 

Time: 3:00pm ET

Understanding and tracking the multifaceted influence of nations is crucial for maintaining a strategic advantage. China is systematically influencing instruments of national power, encompassing diplomatic, information, military, and economic (DIME) spheres. Against the backdrop of the year of the dragon — symbolizing strength, wisdom, and transformation — this program will delve into how open-source intelligence (OSINT) can empower military leaders to gain and maintain a decision advantage as China pursues its global objectives.
 
This webinar will explore the use of publicly available information (PAI) to understand this complex geopolitical landscape. Attendees will learn about:
  • DIME power dynamics: An analysis of China's diplomatic, information, military, and economic initiatives and their interplay on the global stage
  • The importance of the year of the dragon: Parallels between the characteristics of the year of the dragon and China's strategic approach and impact on international affairs
  • OSINT/PAI: A deep dive into the efficacy of OSINT tools in gathering and analyzing publicly available information to decipher China's intentions
  • Decision advantage: Understanding how military leaders can leverage OSINT to gain insights, anticipate actions, and ultimately maintain a decision advantage in response to China
  • Perspectives from other Pacific nations, including Australia, on how they view China's evolving influence
Join the team on February 28, 2024, at 3:00pm ET/12:00pm PT when they will help decode the dragon's influence and showcase how OSINT can be a powerful tool in the pursuit of strategic advantage.
 
 
 
 
 
 
 
 
Entrust logo

 

AI in Cybersecurity: What the Pros (and Hackers) Know

Speakers: Shiladitya Sircar, SVP Product Engineering and Data Science | Adam Sloan, Technical Product Marketing Director

AI in Cybersecurity. 

You are not alone in the adoption of AI. Threat actors utilize AI to carry out sophisticated cyberattacks at speed and scale. Organizations must stay one step ahead to mitigate attacks earlier and with less effort. There is no denying since the advent of ChatGPT, generative AI has been a hot topic. But you may not be aware that our Cylance® cybersecurity solutions have used AI for more than a decade. Cylance AI is the industry’s longest-running, continuously improving, predictive AI on the market. Join us at our webinar to hear from pioneers of AI in cybersecurity as we share strategies to tackle the evolving threat landscape. 
  • During the webinar, experts from BlackBerry will share their insights on: 
  • The pros and cons of AI and generative AI applications in cybersecurity
  • What to look for when evaluating AI-based business products
  • How to weigh risk versus value when choosing AI-based security applications
     
 
 
 
 
Solarwinds logo

 

CORAS Portfolio and Program Optimization for DoD Decision Management Now

Speakers: Dan Naselius, President & CTO CORAS | Gordon Irons, CORAS Customer Success

Time: 11:00AM ET

PMAs face significant challenges in accessing, communicating, and managing data due to multiple tools, stove-piped sources, and the need for sophisticated integration. DoD departmental decision management demands predictive algorithms, AI, and ML to support informed decision-making processes at the speed of relevance.

In this webinar on February 20, 2024 at 11 am, Carahsoft partner CORAS examines the unique needs of DoD PMAs and how leveraging its unique AI/NLP toolset they can deliver cohesive solutions to support real time agile decision management within departments, without displacing existing systems. We will look at some recent success stories to share how to integrate the full data picture for enterprise visualizations, extract root cause analysis from structured and unstructured documents, optimize information needed for conclusions from large datasets, and facilitate faster decision-making.

Other elements of the webinar will examine how PMAs can automate processes, synchronize program schedules from different sources, and transfer data into reports and presentations without manual processes. Model-based systems engineering, and advanced analytical tools can enhance the collection and analysis of test data. CORAS is a FedRAMP High SaaS also available on the NIPR/SIPR so bring your security questions in addition to questions on how to optimize your portfolios, track and manage numerous programs of record, and fully visualize portfolio and program relationships, conflicts or relevance.

 
 
 
 
 
 
 
Entrust logo

 

Who's Minding the Keys to the Kingdom?

Speakers: Andrew Sheedy, Digital Security Consultant | David Low, Global Vice President of Professional Services 

Cryptographic keys are some of your organization’s most precious assets, therefore it’s essential to know who is minding them. The value of any key is equivalent to the value of all the data it protects. A single stolen or misallocated key could lead to a huge data breach with the consequential reputational damage, penal regulatory fines, and loss of investor and customer confidence.

In this webinar you will learn how to:

  • Utilize HSMs to protect the keys you have stored in disparate locations
  • Add a robust layer of security to prevent attacker from finding your keys
  • Establish a root of trust in your organization by safeguarding and managing your cryptographic keys and processes in a certified hardware environment
 
 
 
 
Gigamon Logo

 

Multi-Cloud Deep Observability: From The Enterprise Cloud To The Tactical Edge 

Speaker: Carl Rios, Cloud Architect for Public Sector 

Time: 1:00PM ET

Hybrid cloud infrastructure is complex and time-consuming to secure, manage and maintain. Modern organizations must contend with multiple cloud providers and a myriad cloud, security, and observability tools, which add layers of complexity and make it challenging to detect security threats and performance anomalies.
 
The DoD must not only face these challenges, but also must account for disrupted, disconnected, intermittent and low-bandwidth (DDIL) cloud environments that support theaters of operation. This webinar will include how the hybrid-cloud network is the foundation of the hyper-connected digital infrastructure, and why network visibility and control are paramount for the proper operation and protection of all the network components and capabilities.
 
During this webinar, attendees will learn how to:
  • Access network traffic insights without blind spots through Gigamon's Deep Observability Pipeline
  • Empower their mission to safeguard critical network infrastructure and assets with high-performance, next-generation network visibility
  • Become agile for edge and tactical cloud network deployments
  • Normalize and consolidate network traffic insights with one Visibility Fabric
  • Derive continuous insights into the behavior and activity in their networks
 
 
 
 
 
 
Solarwinds logo

 

Bridging the Largest Threat Visibility Gap: Addressing the Email Threat Landscape with Proofpoint Threat Intelligence

Speakers: Robert Biestman, Senior Manager, Threat Intelligence, Proofpoint | Garrett Guinivan, Senior Solutions Architect, Proofpoint | Chris Dawson, Threat Intelligence Lead, Proofpoint

Time: 1:30PM ET

Join Proofpoint and Carahsoft to explore visibility gaps experienced by too many government organizations facing threats in email and beyond. Because email sits so early in the kill chain, has such broad impacts across government organizations and provides such a large attack surface for threat actors, insights from email-based threats can help you "shift left" and transform everything from end user awareness training to defense-in-depth approaches.


This webinar will include specific use cases demonstrating how organizations like yours can use Proofpoint Threat Intelligence to improve detections and proactively prepare both users and your enterprise for emerging threats and social engineering tactics.


Attendees of this webinar will learn:
• A better understanding of the email threat landscape
• Ways they can leverage threat intelligence in their maturing approaches to anticipating rather than merely reacting to the threats they face

 
 
 
 
 
 
 
Solarwinds logo

 

Establishing a Zero Trust Compliant Data Pillar

Speakers: Carmelo McCutcheon, Public Sector CTO | Subramanian Kartik, Global VP of Systems Engineering

Time: 1:00PM ET

In early 2022, the Office of Management and Budget (OMB) issued its Memorandum M-22-09 which required agencies to meet specific zero trust guidelines centered around five pillars; Identity, Devices, Network, Applications, and Data. This requirement now applies to all federal, defense, and intelligence agencies.
 
In this session we will take a closer look at the data pillar, and share how you can leverage the requirements of this pillar to protect against increasingly sophisticated and persistent threats.
 
Join experts from VAST Data & Carahsoft on Thursday February 22nd at 1:00PM ET for an interactive discussion about how IT professionals can leverage security features to establish a data pillar for zero trust that is both secure and compliant with OMB regulations.