Created with Sketch.
CarahCast: Podcasts on Technology in the Public Sector
17 minutes | May 17, 2022
Episode 2: A Zero Trust Approach to Secure Operational Technology Systems
In this podcast, our panel emphasizes the importance of thorough planning in executing a strong IT/OT convergence and outlines key items to account for.
50 minutes | May 13, 2022
The Future of Storage for Workloads with Dell Technologies
The future of storage is here at Dell Technologies with powerful, efficient, and intelligent enterprise arrays. Hear from subject matter experts on the Dell Technologies advantage and how it can accelerate your transformations with multi-dimensional data storage, protection, and much more!
41 minutes | May 11, 2022
Answer the White House Call to Action – Increase Cyber Defense with Exodus Intelligence
Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide government agencies the unique ability to understand, prepare, and defend against the ever-changing landscape of cybersecurity. Exodus also provides customers with actionable threat intelligence including deep vulnerability analysis, detection and mitigation guidance, and tooling to test defenses.
17 minutes | Apr 19, 2022
A Zero Trust Approach to Secure Operational Technology Systems
In this podcast, our panel highlights the value of IT/OT convergence, and its impact on the practitioners across the security community. Topics covered in this session include the benefits of comprehensive OT security training, the OT lessons learned from the Log4j vulnerability, and what first steps to take on your convergence journey.
25 minutes | Apr 8, 2022
Waterfall Podcast Series Ep.1: Critical Infrastructures: Recent Attacks, Near-Term Projections, and How to Prepare
Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, joined Carahsoft to discuss Critical (Industrial) Infrastructures, Recent Attacks, Near-Term Projections, and How to Prepare. SUBSCRIBE to get the latest tech tips & tricks from industry leaders!https://www.youtube.com/user/carahtechtv FOLLOW US ON TWITTER:https://twitter.com/Carahsoft CONNECT WITH US ON LINKEDIN:https://www.linkedin.com/company/cara... LIKE US ON FACEBOOK:https://www.facebook.com/carahsoft LISTEN TO US ON OUR CARAHCAST CHANNEL:https://www.carahsoft.com/carahcast READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS:https://www.carahsoft.com/community
27 minutes | Apr 7, 2022
The Four Cornerstones of a Successful Procure-to-Pay Transformation with Coupa
In this podcast, Eric Williams, AVP of Supply Chain Management at University of Texas (UT) Health Houston, discussed how to collaborate with staff and stakeholders for mutual success. Attendees learned about his four cornerstones of a successful Procure-to-Pay (P2P) transformation and how he used change management to drive value for UT Health.
44 minutes | Mar 24, 2022
The State of the Phishing Landscape: Why Being Intelligence Led, Human Reporting + AI are a Must to Protect Your Agency
Listen in and hear how agencies can be equipped with solutions to quickly find, respond to, and remediate phishing attacks in real-time by combining the power of human reporting and high-fidelity AI & machine learning.
36 minutes | Mar 21, 2022
"But we've always done it this way."— New Cybersecurity for Federal Agencies
Join Blackberry and Carahsoft for a podcast on new cybersecurity for federal agencies. Today, federal agencies are challenged with prioritizing the data security and privacy of the American people and government amid an increasingly sophisticated threat landscape. The Cybersecurity Executive Order (CSEO) charges, “...the Federal government should lead in cybersecurity...” However, the past approach – adding additional layers to an already overly complex and unmanageable security infrastructure, managed by too few resources – is not sustainable. A new perspective is required to keep up, and ahead, of cyber adversaries today and in the future. During this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry we will explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity – or having a bigger team – does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results.
42 minutes | Mar 18, 2022
Operation Work Safer: Eliminate Threats and Protect Against Cyber Terrorism with Google Cloud
Google is bringing the best of their products and cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud's Work Safer program enables public sector organizations to securely collaborate and communicate in hybrid work environments.
33 minutes | Mar 16, 2022
Mission First Podcast Series: The Government IT Supply Chain, Explained
Watch episode three of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. During this session, Keith Nakasone, former deputy assistant commissioner of acquisition management within the information technology office at the General Services Administration’s (GSA) Federal Acquisition Service and Federal Strategist, VMware and Craig Bowman, Sr. Director - Federal, VMware, will discuss: Changes needed in the acquisition space to stay aligned with cloud modernization efforts How cybersecurity measures are changing to address increased concerns and supply chain risks U.S Government priorities in the new year, including moving to the hybrid cloud, supporting small businesses, and increasing work-from-anywhere capabilities
45 minutes | Mar 15, 2022
CXO Cheat Sheet: Complying with the Federal Zero Trust Strategy
With the release of OMB’s Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. Listen to the expert panel including former Federal CISO, Danny Connelly, as they discuss pitfalls to avoid when implementing OMB’s required actions and how to quickly comply with the strategy requirements without cutting corners.
29 minutes | Mar 4, 2022
You Can't Secure What You Can't See: Apply TruContext™ to Your Splunk Data with Visium Analytics
In Visium’s newest podcast, Jesse Jones, Chief Architect at Visium Analytics and Joel Kelly, Director of Special Projects, joined us to provide an understanding on how TruContext™ enriches your Splunk processed data with an intuitive topological type view of the relationships amongst disparate data points.
52 minutes | Feb 9, 2022
Mission First Podcast Series: Kessel Run and Continuous Authority to Operate
Watch episode two of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. During this session, Jeremiah Sanders, Co-Founder of Kessel Run and Senior Federal Strategist, VMware and Alex Barbato, Senior Engineer, VMware Tanzu discuss: Continuous ATO and how has it evolved into Continuous Risk Management Framework The evolution of Kessel Run and how it set the stage for Continuous ATO in DoD agencies How agencies can begin the process and achieve Continuous ATO and more! Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.
10 minutes | Jan 25, 2022
Learn About the Benefits and Updates of Your VMware Renewals
Start the new year right with VMware! Tune in to hear Lindy Christian, VMware’s Channel Engagement Manager, as she discusses the benefits and updates of renewing your VMware subscriptions.
49 minutes | Jan 25, 2022
Secure Collaboration in M365 within a Zero Trust Lens with AvePoint
Stream AvePoint's new podcast to learn how federal agencies can leverage Microsoft 365’s collaborative power using a Zero Trust model. Topics discussed include automating policy enforcement at the workspace (Teams, SharePoint, and M365 Groups), workspace compliance, lifecycle, and permissions recertification based on data sensitivity, and intelligent reporting of exposure risk based on sensitive information types and permissions data.
53 minutes | Jan 14, 2022
The Future Begins Now with VMware Carbon Black
The Biden Administration has issued an Executive Order mandating all government agencies to deploy an endpoint detection and response (EDR) program to protect their data. To protect yours, trust only the most-deployed threat hunting tool in the U.S. government: VMware Carbon Black.
33 minutes | Jan 11, 2022
Cybersecurity Executive Order: 10 Database Security Best Practices to Help Meet Mandates with Trustwave
Listen to experts discuss database security best practices to assist in meeting the Presidential Executive Order on Cybersecurity.
58 minutes | Jan 5, 2022
Mission First Podcast Series: Kubernetes 2.0
Hear this conversation between Joe Beda, Co-creator of Kubernetes and Principal Engineer, VMware and Paul Puckett, Director of the Enterprise Cloud Management Office (ECMO), U.S. Army where they discuss: The development Kubernetes and when Joe realized it would be a part of every major software conversation globally Key trends, practices, and differences happening in the public sector versus private How Kubernetes helps manage Day 2 complexities of applications spanning from cloud service providers (CSP's), datacenters, and to the edge and much more... Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.
40 minutes | Dec 1, 2021
10 Cybersecurity Best Practices Ransomware Fears Most
The headlines are staggering. Hospitals and healthcare systems are struggling to protect against ransomware attacks, resulting in longer patient stays, delays in procedures, and ultimately, an increase in patient deaths. Although ransomware can cause serious damage, it’s not invincible. In fact, it’s only as strong as your organization’s weakest link. Why not turn the table on ransomware hackers for good? Veritas Healthcare CTO, Rick Bryant, explained the top 10 best practices your hospital or healthcare system can implement today to create a multi-layered, flexible, unified defense strategy that will ensure resilience and eliminate the risks to patient care.
53 minutes | Oct 28, 2021
Phishing with VMware
Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other attacks, such as ransomware.
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2022