Webinar

​Federal contractors and subcontractors are being breached at alarming rates, resulting in the loss of sensitive data. To address this challenge, agencies like the Department of Defense are turning to new cybersecurity requirements for contractors, including the Cybersecurity Maturity Model Certification (CMMC).

Added:
Webinar

The U.S. Department of Defense (DoD) is going to require public sector organization to meet the Cybersecurity Maturity Model Certification (CMMC) requirements to bid on contracts. During this webinar, Erinn Connor, federal systems integrator & sales enablement manage and Kyle Dimitt, senior compliance research engineer, at LogRhythm, discuss these new requirements to help your team prepare for certification.

Added:
Webinar

A webinar to present the findings of the above mentioned study. There will be a Q&A with Steve Grewal and Colonel Charles L. Destefani, Chief Data Officer, Air Force focused on federal challenges, best practices and mass data fragmentation.

Added:
Webinar

Watch now, the recorded webinar, and check out other helpful resources from CrowdStrike that highlight 2020 healthcare industry threat trends, emerging best practices – like the 1/10/60 operational cyber security metric – and evaluate standards across HiTrust, NIST CSF and much more.

Added:
Webinar

Hear AWS's Andrew DeFoe review how leading education institutions in Higher Education and K12 are leveraging the cloud to connect their students and faculty to mission critical resources.

Added:
Webinar

​Don't let your education fall behind during these unprecedented times. Learn in a virtual classroom with Red Hat! Review the value of Virtual Training: Live instructor-led training which is real-time training conducted by Red Hat Certified Instructors.

Added:
Webinar

​Take your skills to the next level with Red Hat Training. Learn the benefits for your organization and begin your training journey today.

Added:
Webinar

In this webinar, MindPoint Group, an advanced team of cybersecurity consulting experts, will outline how you can overcome these barriers to compliance. Hint — it all starts with automation.

Added:
Webinar

Modern development organizations must consider security at the earliest stages of development to ensure that security and quality are built into every aspect of their application.

Added:
Webinar

This webinar explores how universities are using a cloud-first approach to meet the needs of secure desktops and high-performance lab application access for your students, faculty and staff.

Added:
Webinar

This webinar explores how universities are using a cloud-first approach to meet the needs of secure desktops and high-performance lab application access for your students, faculty and staff.

Added:
Webinar
Automation Anywhere, with special guest Cognilytica, discuss how Intelligent Automation is transforming our government and the important role that AI plays in the process. View the discussion as they address some of the biggest questions about Intelligent Automation.
Added:
Webinar
 Learn how Trend Micro Deep Security can protect your cloud and datacenter workloads against vulnerabilities, malware, and unauthorized changes through a single, unified console.
Added:
Webinar
This webinar will address the top 5 challenges that agencies face during cloud migration and give you the tools to help mitigate those challenges for your agency.
Added:
Webinar
​Panel of Government and Industry experts discuss what is needed to create real optimization of all the data points that are in the Data Center for any government agency and how best to utilize the tools available from industry to answer the challenges of today and in the future. Hosted by the Trezza Media Group and sponsored by DLT & Veritas.  
Added: