<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/sjwL0ZGE" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>CarahCast: Podcasts on Technology in the Public Sector</title>
    <description>CarahCast is Carahsoft’s new podcast channel dedicated to bringing our listeners the latest in Government IT case studies, technology trends, recent legislation news, and Government IT best practices.</description>
    <language>en</language>
    <pubDate>Fri, 27 Mar 2026 15:10:46 +0000</pubDate>
    <lastBuildDate>Fri, 27 Mar 2026 15:10:56 +0000</lastBuildDate>
    <image>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com</link>
      <title>CarahCast: Podcasts on Technology in the Public Sector</title>
      <url>https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/5992a874-0292-4351-b924-c15751530e67/3000x3000/cover-20image-20-option-20b.jpg?aid=rss_feed</url>
    </image>
    <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>CarahCast is Carahsoft’s new podcast channel dedicated to bringing our listeners the latest in Government IT case studies, technology trends, recent legislation news, and Government IT best practices.</itunes:summary>
    <itunes:author>Carahsoft</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/5992a874-0292-4351-b924-c15751530e67/3000x3000/cover-20image-20-option-20b.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/sjwL0ZGE</itunes:new-feed-url>
    <itunes:keywords>#government, #technology, carahsoft</itunes:keywords>
    <itunes:owner>
      <itunes:name>Carahsoft</itunes:name>
      <itunes:email>Hannah.Duncan@carahsoft.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Government"/>
    <itunes:category text="Technology"/>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <item>
      <guid isPermaLink="false">17059651-5a85-417b-872f-90ace0d93dc2</guid>
      <title>Modernizing Federal Government IT with Atlassian and Isos Technology</title>
      <description><![CDATA[Unlock the Atlassian and Isos Technology podcast to hear digital transformation experts discuss how Atlassian Jira Service Management enables greater operational resilience, stronger compliance and better mission outcomes. Discover how to align people and processes by using strategic change management to overcome cultural resistance and ensure modernization leads to scalable, long-term mission success.  
]]></description>
      <pubDate>Fri, 27 Mar 2026 15:10:46 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian, Isos Technology)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernizing-federal-government-it-with-atlassian-and-isos-technology-msxeBJG8</link>
      <enclosure length="28429073" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/44b82138-6b39-4450-af7c-46ff82e4122d/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/audio/group/20a4eaab-39c4-4312-b36c-dfb98f536ddc/group-item/790165ed-6bc0-4afb-a9d5-67d52b06c303/128_default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernizing Federal Government IT with Atlassian and Isos Technology</itunes:title>
      <itunes:author>Carahsoft, Atlassian, Isos Technology</itunes:author>
      <itunes:duration>00:29:26</itunes:duration>
      <itunes:summary>Unlock the Atlassian and Isos Technology podcast to hear digital transformation experts discuss how Atlassian Jira Service Management enables greater operational resilience, stronger compliance and better mission outcomes. Discover how to align people and processes by using strategic change management to overcome cultural resistance and ensure modernization leads to scalable, long-term mission success. </itunes:summary>
      <itunes:subtitle>Unlock the Atlassian and Isos Technology podcast to hear digital transformation experts discuss how Atlassian Jira Service Management enables greater operational resilience, stronger compliance and better mission outcomes. Discover how to align people and processes by using strategic change management to overcome cultural resistance and ensure modernization leads to scalable, long-term mission success. </itunes:subtitle>
      <itunes:keywords>atlassian implementation services, atlassian intelligence, itsm, atlassian managed services, atlassian migration services, modernization, continous ato, atlassian jira service management, jira service management automation, isos technology, federal agencies, fedramp, atlassian system of work consultancy, atlassian consulting services</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>314</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c5bf10e-27e0-461e-8a5b-0b7e2e0c50b8</guid>
      <title>Bastille Presents: The Wireless Threat Series Podcast, Smartglasses</title>
      <description><![CDATA[Explore how Bastille's wireless intrusion detection system protects agencies from IoT attacks. Access the podcast series & secure your critical networks today. 
]]></description>
      <pubDate>Wed, 25 Mar 2026 15:54:01 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Bastille)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bastille-presents-the-wireless-threat-series-podcast-smartglasses-1pwl4Efm</link>
      <enclosure length="31756306" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/44b82138-6b39-4450-af7c-46ff82e4122d/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/audio/group/5ba60185-07cd-4025-85ba-482d655bfb53/group-item/56f55f64-178a-4c64-a09e-7e78a44391bb/128_default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Bastille Presents: The Wireless Threat Series Podcast, Smartglasses</itunes:title>
      <itunes:author>Carahsoft, Bastille</itunes:author>
      <itunes:duration>00:32:53</itunes:duration>
      <itunes:summary>Explore how Bastille&apos;s wireless intrusion detection system protects agencies from IoT attacks. Access the podcast series &amp; secure your critical networks today.</itunes:summary>
      <itunes:subtitle>Explore how Bastille&apos;s wireless intrusion detection system protects agencies from IoT attacks. Access the podcast series &amp; secure your critical networks today.</itunes:subtitle>
      <itunes:keywords>iot security solution, bastille wireless intrusion detection system, business risk, cyber security attack vectors, wireless airspace, data leaks, rf (radio frequency), data privacy, cloud storage security risks, pii exposure, wireless threat detection, enterprise security policy, wireless intrusion detection system, wireless network security solutions, threat scores, attack vectors, wifi deauthentication attack, cloud storage vulnerabilities, iot devices security risks</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>313</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">67e62b55-901b-43a5-8d1f-c861a35dd0d6</guid>
      <title>Bastille Wireless Threat Detection Podcast Series, Smartwatches</title>
      <description><![CDATA[Federal agencies and businesses face growing exposure to wireless threats as modern devices introduce new cybersecurity attack vectors that traditional security tools cannot detect or control. To mitigate consumer and enterprise risks associated with IoT devices in no-phone zones, Bastille Networks’ wireless intrusion detection system identifies and quarantines unauthorized emitters and behavioral abnormalities before data breaches can occur. Explore real-world examples of how Bastille’s IoT security solution proactively defends mission-critical environments from covert emissions, unapproved device behavior and Wi-Fi deauthentication attacks. 
]]></description>
      <pubDate>Thu, 19 Mar 2026 18:01:18 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (bastille, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bastille-wireless-threat-detection-podcast-series-smartwatches-OQvMrPtX</link>
      <enclosure length="30590234" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/44b82138-6b39-4450-af7c-46ff82e4122d/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/audio/group/15d4c54e-3be3-48cc-8294-b1cd16ff69b9/group-item/c5ecd2f2-634f-4b3b-a4bb-8524c097626a/128_default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Bastille Wireless Threat Detection Podcast Series, Smartwatches</itunes:title>
      <itunes:author>bastille, Carahsoft</itunes:author>
      <itunes:duration>00:31:40</itunes:duration>
      <itunes:summary>Federal agencies and businesses face growing exposure to wireless threats as modern devices introduce new cybersecurity attack vectors that traditional security tools cannot detect or control. To mitigate consumer and enterprise risks associated with IoT devices in no-phone zones, Bastille Networks’ wireless intrusion detection system identifies and quarantines unauthorized emitters and behavioral abnormalities before data breaches can occur. Explore real-world examples of how Bastille’s IoT security solution proactively defends mission-critical environments from covert emissions, unapproved device behavior and Wi-Fi deauthentication attacks.</itunes:summary>
      <itunes:subtitle>Federal agencies and businesses face growing exposure to wireless threats as modern devices introduce new cybersecurity attack vectors that traditional security tools cannot detect or control. To mitigate consumer and enterprise risks associated with IoT devices in no-phone zones, Bastille Networks’ wireless intrusion detection system identifies and quarantines unauthorized emitters and behavioral abnormalities before data breaches can occur. Explore real-world examples of how Bastille’s IoT security solution proactively defends mission-critical environments from covert emissions, unapproved device behavior and Wi-Fi deauthentication attacks.</itunes:subtitle>
      <itunes:keywords>iot security solution, intrusion detection system, business risk, cyber security attack vectors, wireless airspace, data leaks, rf (radio frequency), data privacy, cloud storage security risks, pii exposure, wireless threat detection, enterprise security policy, wireless intrusion detection system, wireless network security solutions, threat scores, attack vectors, wifi deauthentication attack, cloud storage vulnerabilities, bastille wireless, iot devices security risks</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>312</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b08bca08-d015-4c63-9d7b-7f281c4d01a1</guid>
      <title>Scaling Remote Support in Education and Government: The Nash County Playbook</title>
      <description><![CDATA[Public Sector organizations must meet customer expectations with limited resources while managing thousands of endpoints securely and efficiently across complex, distributed operating environments. To deliver high-quality services that protect critical systems from unauthorized users, Government and Education IT teams leverage BeyondTrust’s remote support capabilities to improve response times, reduce friction for technicians and ensure operational continuity.  
]]></description>
      <pubDate>Fri, 6 Mar 2026 14:42:57 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, BeyondTrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/scaling-remote-support-in-education-and-government-the-nash-county-playbook-p_B470ht</link>
      <enclosure length="50839906" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/44b82138-6b39-4450-af7c-46ff82e4122d/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/audio/group/67c67f4d-8257-44ec-aeb5-08303af37965/group-item/67bef4c6-39da-4c8f-9324-38497f143ad4/128_default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Scaling Remote Support in Education and Government: The Nash County Playbook</itunes:title>
      <itunes:author>Carahsoft, BeyondTrust</itunes:author>
      <itunes:duration>00:52:56</itunes:duration>
      <itunes:summary>Public Sector organizations must meet customer expectations with limited resources while managing thousands of endpoints securely and efficiently across complex, distributed operating environments. To deliver high-quality services that protect critical systems from unauthorized users, Government and Education IT teams leverage BeyondTrust’s remote support capabilities to improve response times, reduce friction for technicians and ensure operational continuity. </itunes:summary>
      <itunes:subtitle>Public Sector organizations must meet customer expectations with limited resources while managing thousands of endpoints securely and efficiently across complex, distributed operating environments. To deliver high-quality services that protect critical systems from unauthorized users, Government and Education IT teams leverage BeyondTrust’s remote support capabilities to improve response times, reduce friction for technicians and ensure operational continuity. </itunes:subtitle>
      <itunes:keywords>endpoint security manager, help desk for education, secure remote access for government, public sector it help desk modernization, endpoint privilege management solutions, privileged access management for education, school district remote support, education it service desk, secure remote support for it teams, zero trust remote access, it help desk services, beyondtrust remote support, zero trust remote access solutions, government remote support, beyondtrust privileged access management, k–12 it help desk scaling, remote helpdesk services, zero trust identity management, remote access security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>311</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0a1c10b8-1421-4dad-8d9c-8fffaad60a19</guid>
      <title>Unifying Federal Data Management and Security with Hitachi VSP One</title>
      <description><![CDATA[Access the podcast to hear AIOps experts discuss how Hitachi VSP One delivers high-performance file services that accelerate IT modernization by improving fleet management, operational visibility and API-driven automation. Learn how Hitachi Vantara Federal can help your agency streamline firmware updates, licensing and system setup to enhance application performance and automate critical data workloads.   
]]></description>
      <pubDate>Tue, 24 Feb 2026 20:05:45 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Hitaci Vantara Federal)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unifying-federal-data-management-and-security-with-hitachi-vsp-one-R1aMQU8_</link>
      <enclosure length="41779634" type="audio/mpeg" url="https://cdn.simplecast.com/media/audio/transcoded/44b82138-6b39-4450-af7c-46ff82e4122d/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/audio/group/b4459621-566b-482a-8c68-d0e31ba52717/group-item/1a6931b6-b6b3-443a-bebb-7515a068c708/128_default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unifying Federal Data Management and Security with Hitachi VSP One</itunes:title>
      <itunes:author>Carahsoft, Hitaci Vantara Federal</itunes:author>
      <itunes:duration>00:43:30</itunes:duration>
      <itunes:summary>Access the podcast to hear AIOps experts discuss how Hitachi VSP One delivers high-performance file services that accelerate IT modernization by improving fleet management, operational visibility and API-driven automation. Learn how Hitachi Vantara Federal can help your agency streamline firmware updates, licensing and system setup to enhance application performance and automate critical data workloads.  </itunes:summary>
      <itunes:subtitle>Access the podcast to hear AIOps experts discuss how Hitachi VSP One delivers high-performance file services that accelerate IT modernization by improving fleet management, operational visibility and API-driven automation. Learn how Hitachi Vantara Federal can help your agency streamline firmware updates, licensing and system setup to enhance application performance and automate critical data workloads.  </itunes:subtitle>
      <itunes:keywords>hitachi storage management software, unified data storage, vsp one block high end, virtual storage platform, hitachi vantara federal, mission-critical workloads, onboard servers with ease, data automation platform, hitachi vsp one, hitachi virtual storage platform, integrated security and resiliency, hybrid cloud, all-flash storage solutions, api-driven operations, workflow automation powered by rest apis and ansible integration, unified data platform, hybrid cloud data storage</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>310</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b9c3c64e-4cf3-4665-9a51-c0b92ee44c56</guid>
      <title>The Risks of Smartphones on US Military Ships</title>
      <description><![CDATA[The Department of Defense (DoD) must ensure the confidentiality of military vessels locations by mitigating the use of mobile devices, unauthorized wireless activity and radio frequency (RF) based threats. To identify active device emissions and enhance operational security, Bastille’s wireless intrusion detection system leverages smartphones, commercial satellite networks and advanced geolocation techniques to identify their own RF signatures before adversaries can exploit them.
Access the Bastille podcast to hear Scott Stapp, a retired Air Force general and former CTO at Northrop Grumman, discuss airspace security challenges and the need for proactive RF monitoring tools. Discover the importance of implementing device policies, operational security (OPSEC) education and practical solutions like Faraday bags and RF detection systems to defend against wireless threats. 
Fill out the form to unlock the Bastille podcast and discover how your organization can protect mission-critical environments with wireless intrusion detection systems.
 
]]></description>
      <pubDate>Wed, 4 Feb 2026 15:26:45 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/strengthen-navy-security-with-bastille-radio-frequency-monitoring-NcbBcNjE</link>
      <enclosure length="20546383" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/375ffd4b-6e8f-4390-96ed-2495b3c8145a/audio/51f5a9ce-78a0-4875-acb5-930f0aa466ed/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Risks of Smartphones on US Military Ships</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:21:11</itunes:duration>
      <itunes:summary>The Department of Defense (DoD) must ensure the confidentiality of military vessels locations by mitigating the use of mobile devices, unauthorized wireless activity and radio frequency (RF) based threats. To identify active device emissions and enhance operational security, Bastille’s wireless intrusion detection system leverages smartphones, commercial satellite networks and advanced geolocation techniques to identify their own RF signatures before adversaries can exploit them.
Access the Bastille podcast to hear Scott Stapp, a retired Air Force general and former CTO at Northrop Grumman, discuss airspace security challenges and the need for proactive RF monitoring tools. Discover the importance of implementing device policies, operational security (OPSEC) education and practical solutions like Faraday bags and RF detection systems to defend against wireless threats. 
Fill out the form to unlock the Bastille podcast and discover how your organization can protect mission-critical environments with wireless intrusion detection systems.
</itunes:summary>
      <itunes:subtitle>The Department of Defense (DoD) must ensure the confidentiality of military vessels locations by mitigating the use of mobile devices, unauthorized wireless activity and radio frequency (RF) based threats. To identify active device emissions and enhance operational security, Bastille’s wireless intrusion detection system leverages smartphones, commercial satellite networks and advanced geolocation techniques to identify their own RF signatures before adversaries can exploit them.
Access the Bastille podcast to hear Scott Stapp, a retired Air Force general and former CTO at Northrop Grumman, discuss airspace security challenges and the need for proactive RF monitoring tools. Discover the importance of implementing device policies, operational security (OPSEC) education and practical solutions like Faraday bags and RF detection systems to defend against wireless threats. 
Fill out the form to unlock the Bastille podcast and discover how your organization can protect mission-critical environments with wireless intrusion detection systems.
</itunes:subtitle>
      <itunes:keywords>electronic detecting device, wireless intrusion prevention system, faraday phone bag, national security airspace, navy opsec training, wireless intrusion detection system, radio frequency monitoring system, electronic intrusion detection system, radio frequency detection device</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>309</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c79e56b6-2f07-4dfa-a1f8-fcf453b4af4d</guid>
      <title>Entrust Strengthens Digital Trust for Government with Identity Management Solutions</title>
      <description><![CDATA[State and Local agencies must modernize outdated infrastructure and authentication methods to mitigate evolving cyber threats, such as ransomware and credential-based attacks. To strengthen digital trust with adaptive access controls, Entrust empowers Government agencies to manage identity security with compliant passwordless, biometric and multi-factor authentication (MFA) systems. 
]]></description>
      <pubDate>Tue, 27 Jan 2026 15:54:08 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Entrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/entrust-strengthens-digital-trust-for-government-with-identity-management-solutions-XdXqMZy1</link>
      <enclosure length="74096736" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/817b8755-6c83-4afa-ba9b-438f9cc60f35/audio/0eb61ab0-ea14-4309-8036-e231d0bcb676/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Entrust Strengthens Digital Trust for Government with Identity Management Solutions</itunes:title>
      <itunes:author>Carahsoft, Entrust</itunes:author>
      <itunes:duration>01:17:00</itunes:duration>
      <itunes:summary>State and Local agencies must modernize outdated infrastructure and authentication methods to mitigate evolving cyber threats, such as ransomware and credential-based attacks. To strengthen digital trust with adaptive access controls, Entrust empowers Government agencies to manage identity security with compliant passwordless, biometric and multi-factor authentication (MFA) systems.</itunes:summary>
      <itunes:subtitle>State and Local agencies must modernize outdated infrastructure and authentication methods to mitigate evolving cyber threats, such as ransomware and credential-based attacks. To strengthen digital trust with adaptive access controls, Entrust empowers Government agencies to manage identity security with compliant passwordless, biometric and multi-factor authentication (MFA) systems.</itunes:subtitle>
      <itunes:keywords>password less authentication, identity management, criminal justice information services (cjis, authentication challenges in state &amp; local government, modernizing state and local infrastructure, digital trust services, password-less authentication, state and local cybersecurity, multi factor authentication solutions, digital trust, secure identity authentication, identity management solutions, biometric authentication systems, cjis compliance, adaptive access, entrust, mfa, multi-factor authentication (mfa), cybersecurity law enforcement, security identity and access management, law enforcement cybersecurity, adaptive access control</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>308</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6caaa791-4dc6-4b1c-82de-ad3039aedfa3</guid>
      <title>Modernizing Financial Data Management with SAP Concur</title>
      <description><![CDATA[Utilities companies with manual, paper-based systems must adopt cloud-based spend management software to efficiently manage expenses, receipts, reporting, auditing and compliance. By integrating with Enterprise Resource Planning (ERP) systems and leveraging automation capabilities, SAP Concur empowers Government agencies to simplify financial data management, strengthen security posture and streamline mission-critical processes to improve data accuracy and integrity. 
Access the SAP Concur podcast to hear industry experts discuss how AI-powered expense management tools digitally capture receipts, centralize invoices and reduce audit risks for utilities companies. Explore how to maximize operational efficiency with built-in compliance governance and continuous monitoring features that enhance real-time decision-making.
Fill out the form to unlock the SAP Concur podcast and learn how to streamline spend management for your organization.
 
]]></description>
      <pubDate>Fri, 9 Jan 2026 17:29:31 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, SAP)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernizing-financial-data-management-with-sap-concur-3AHXlSNc</link>
      <enclosure length="35313103" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d6874fa8-fece-4029-b9b3-fbb9096111e9/audio/ef1243a1-4f5c-4c32-a337-a9d87b7bf024/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernizing Financial Data Management with SAP Concur</itunes:title>
      <itunes:author>Carahsoft, SAP</itunes:author>
      <itunes:duration>00:36:35</itunes:duration>
      <itunes:summary>Utilities companies with manual, paper-based systems must adopt cloud-based spend management software to efficiently manage expenses, receipts, reporting, auditing and compliance. By integrating with Enterprise Resource Planning (ERP) systems and leveraging automation capabilities, SAP Concur empowers Government agencies to simplify financial data management, strengthen security posture and streamline mission-critical processes to improve data accuracy and integrity. 
Access the SAP Concur podcast to hear industry experts discuss how AI-powered expense management tools digitally capture receipts, centralize invoices and reduce audit risks for utilities companies. Explore how to maximize operational efficiency with built-in compliance governance and continuous monitoring features that enhance real-time decision-making.
Fill out the form to unlock the SAP Concur podcast and learn how to streamline spend management for your organization.
</itunes:summary>
      <itunes:subtitle>Utilities companies with manual, paper-based systems must adopt cloud-based spend management software to efficiently manage expenses, receipts, reporting, auditing and compliance. By integrating with Enterprise Resource Planning (ERP) systems and leveraging automation capabilities, SAP Concur empowers Government agencies to simplify financial data management, strengthen security posture and streamline mission-critical processes to improve data accuracy and integrity. 
Access the SAP Concur podcast to hear industry experts discuss how AI-powered expense management tools digitally capture receipts, centralize invoices and reduce audit risks for utilities companies. Explore how to maximize operational efficiency with built-in compliance governance and continuous monitoring features that enhance real-time decision-making.
Fill out the form to unlock the SAP Concur podcast and learn how to streamline spend management for your organization.
</itunes:subtitle>
      <itunes:keywords>concur expense reporting, utility expense management services, software solutions, automated expense reporting, ai powered expense management, expense report management software, erp integration solutions, spend management, financial data management solutions, expense management automation, digital receipt system, sap concur solutions</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>307</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">49af7f30-90c0-4408-a48d-6cf7500d58b1</guid>
      <title>Weather the Storm of Migrating to the Cloud</title>
      <description><![CDATA[Migrating to the cloud doesn’t have to feel like navigating a storm. Every digital transformation initiative is unique and comes with its own risks, surprises and decisions that can make or break your journey — but it doesn’t have to be overwhelming. 
]]></description>
      <pubDate>Thu, 8 Jan 2026 14:18:16 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/weather-the-storm-of-migrating-to-the-cloud-LUaDcaF7</link>
      <enclosure length="20357891" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b5d528f9-9028-404e-8cca-a5f1907bc857/audio/21fea38d-c7c5-48a9-bd1c-27fbf34421b8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Weather the Storm of Migrating to the Cloud</itunes:title>
      <itunes:author>Atlassian, Carahsoft</itunes:author>
      <itunes:duration>00:21:01</itunes:duration>
      <itunes:summary>Migrating to the cloud doesn’t have to feel like navigating a storm. Every digital transformation initiative is unique and comes with its own risks, surprises and decisions that can make or break your journey — but it doesn’t have to be overwhelming.</itunes:summary>
      <itunes:subtitle>Migrating to the cloud doesn’t have to feel like navigating a storm. Every digital transformation initiative is unique and comes with its own risks, surprises and decisions that can make or break your journey — but it doesn’t have to be overwhelming.</itunes:subtitle>
      <itunes:keywords>solutions, herzum, digital transformation tools, cloud migration solutions, cloud migration risks and mitigation, cloud migration risk assessment, cloud migration guide, cloud modernization strategy, atlassian cloud migration, herzum atlassian</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>306</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">79377d40-b866-4dca-a53d-e25e43f3346e</guid>
      <title>Vercara Defends Higher Ed from Network Attacks</title>
      <description><![CDATA[Tune into the Vercara podcast to hear cybersecurity experts break down the latest attack trends and explore how organizations defend against DDoS threats with cloud-based security management tools. Discover how to build resilient IT infrastructure that ensures secure and accessible online services for higher education. 
]]></description>
      <pubDate>Wed, 26 Nov 2025 17:56:13 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Vercara, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/vercara-defends-higher-ed-from-network-attacks-0wYqTh3U</link>
      <enclosure length="34507688" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6ecae56b-8583-4f8e-8ccf-08dbe5ca8875/audio/23c0d837-b274-4462-be56-411572c313d2/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Vercara Defends Higher Ed from Network Attacks</itunes:title>
      <itunes:author>Vercara, Carahsoft</itunes:author>
      <itunes:duration>00:35:55</itunes:duration>
      <itunes:summary>Tune into the Vercara podcast to hear cybersecurity experts break down the latest attack trends and explore how organizations defend against DDoS threats with cloud-based security management tools. Discover how to build resilient IT infrastructure that ensures secure and accessible online services for higher education.</itunes:summary>
      <itunes:subtitle>Tune into the Vercara podcast to hear cybersecurity experts break down the latest attack trends and explore how organizations defend against DDoS threats with cloud-based security management tools. Discover how to build resilient IT infrastructure that ensures secure and accessible online services for higher education.</itunes:subtitle>
      <itunes:keywords>dos, network, cybersecurity in higher education, network infrastructure security, vercara ddos, infrastructure, higher ed, ddos protection solution, security system, cybersecurity attack trends in higher ed, dns security solutions, vercara dns, dnsd, cyber attack trends</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>305</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6201aeb6-b626-49cd-aff4-e14b801160d4</guid>
      <title>Purpose-Driven Leadership From Entrepreneurship to Mental Health Advocacy</title>
      <description><![CDATA[Operation Relief Fund (ORF) is a nonprofit organization committed to helping Special Operations Forces (SOF) and Shadow Warriors find relief from PTSD and trauma. Through advanced stellate ganglion block (ASGB) treatments, ORF offers a path to healing and improved quality of life for post-combat veterans. 
Listen to the podcast series to hear participants, partners and leaders share impactful stories of resilience and the mission behind the ORF. Discover how the ORF is providing life coaching along with ASGB to help veterans transition to civilian life. 
Fill out the form to unlock the ORF podcast series and learn how your organization can create an impact by helping those who protect us. 
 
]]></description>
      <pubDate>Fri, 21 Nov 2025 14:40:22 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Operator Relief Fund, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/stories-of-impact-podcast-by-operator-relief-fund-carahsoft-hl-de2iq-q8Fdo9_4</link>
      <enclosure length="39399675" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ec29ea34-3e55-486c-b814-504db5d921da/audio/eac260ae-e078-4cf9-a32b-a242c5c17921/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Purpose-Driven Leadership From Entrepreneurship to Mental Health Advocacy</itunes:title>
      <itunes:author>Operator Relief Fund, Carahsoft</itunes:author>
      <itunes:duration>00:40:52</itunes:duration>
      <itunes:summary>Operation Relief Fund (ORF) is a nonprofit organization committed to helping Special Operations Forces (SOF) and Shadow Warriors find relief from PTSD and trauma. Through advanced stellate ganglion block (ASGB) treatments, ORF offers a path to healing and improved quality of life for post-combat veterans. 
Listen to the podcast series to hear participants, partners and leaders share impactful stories of resilience and the mission behind the ORF. Discover how the ORF is providing life coaching along with ASGB to help veterans transition to civilian life. 
Fill out the form to unlock the ORF podcast series and learn how your organization can create an impact by helping those who protect us. 
</itunes:summary>
      <itunes:subtitle>Operation Relief Fund (ORF) is a nonprofit organization committed to helping Special Operations Forces (SOF) and Shadow Warriors find relief from PTSD and trauma. Through advanced stellate ganglion block (ASGB) treatments, ORF offers a path to healing and improved quality of life for post-combat veterans. 
Listen to the podcast series to hear participants, partners and leaders share impactful stories of resilience and the mission behind the ORF. Discover how the ORF is providing life coaching along with ASGB to help veterans transition to civilian life. 
Fill out the form to unlock the ORF podcast series and learn how your organization can create an impact by helping those who protect us. 
</itunes:subtitle>
      <itunes:keywords>veteran ptsd programs, operator relief fund, mental health in the military, stellate ganglion block ptsd, resources for veterans, veteran support services, veterans with ptsd, podcasts for veterans</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>304</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7354463d-bf3a-46fe-a602-3cf80a6b7ce9</guid>
      <title>Culture That Cares Why Philanthropy is Good Business (and Great Leadership)</title>
      <description><![CDATA[Stories of Impact is a podcast for veterans that shares real stories from combat to healing. Learn how the ORF provides mental health resources for veterans.  
]]></description>
      <pubDate>Fri, 21 Nov 2025 14:25:34 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Operator Relief Fund, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/stories-of-impact-podcast-by-operator-relief-fund-carahsoft-6hgQ6GbS</link>
      <enclosure length="24002908" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9350340a-b331-4eb5-8702-784cfd8055ee/audio/682bd7a9-ae14-42ca-a1e9-a4ed20ba8689/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Culture That Cares Why Philanthropy is Good Business (and Great Leadership)</itunes:title>
      <itunes:author>Operator Relief Fund, Carahsoft</itunes:author>
      <itunes:duration>00:24:50</itunes:duration>
      <itunes:summary>Stories of Impact is a podcast for veterans that shares real stories from combat to healing. Learn how the ORF provides mental health resources for veterans. </itunes:summary>
      <itunes:subtitle>Stories of Impact is a podcast for veterans that shares real stories from combat to healing. Learn how the ORF provides mental health resources for veterans. </itunes:subtitle>
      <itunes:keywords>veteran ptsd programs, operator relief fund, mental health in the military, •	veterans with ptsd, •	stellate ganglion block ptsd, mental health resources for veterans, podcasts for veterans</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>303</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77a2f815-db40-459f-94bb-bb26864b026f</guid>
      <title>Qlik’s AI-powered Data Analytics Tools Transform Healthcare Claims Management</title>
      <description><![CDATA[Access the podcast to hear healthcare experts discuss how Qlik Predict, Qlik Answers and Qlik Analytics optimize audit processes to identify attack trends and correct claim inaccuracies. Learn how healthcare teams enhance operational efficiency and performance tracking with actionable strategies that identify risks and validate billing policies. 
]]></description>
      <pubDate>Thu, 20 Nov 2025 20:14:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Qlik, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/qliks-ai-powered-data-analytics-tools-transform-healthcare-claims-management-Bnbs3_oz</link>
      <enclosure length="38969417" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/308947ae-6d62-4189-8a1c-2f27526a41bc/audio/7f2e4fc0-90ce-4afe-b668-0eef8de689de/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Qlik’s AI-powered Data Analytics Tools Transform Healthcare Claims Management</itunes:title>
      <itunes:author>Qlik, Carahsoft</itunes:author>
      <itunes:duration>00:40:34</itunes:duration>
      <itunes:summary>Access the podcast to hear healthcare experts discuss how Qlik Predict, Qlik Answers and Qlik Analytics optimize audit processes to identify attack trends and correct claim inaccuracies. Learn how healthcare teams enhance operational efficiency and performance tracking with actionable strategies that identify risks and validate billing policies.</itunes:summary>
      <itunes:subtitle>Access the podcast to hear healthcare experts discuss how Qlik Predict, Qlik Answers and Qlik Analytics optimize audit processes to identify attack trends and correct claim inaccuracies. Learn how healthcare teams enhance operational efficiency and performance tracking with actionable strategies that identify risks and validate billing policies.</itunes:subtitle>
      <itunes:keywords>healthcare claims management software, qlik cloud analytics, healthcare claims audit, qlik answers, healthcare claims, detect fraud, maximize audit efficiency, ai healthcare fraud detection, healthcare claims oversight, qlik ai-driven insights capabilities, flagged claims, mitigate risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>302</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ab08bb0e-1421-4316-8131-1091379b8d5d</guid>
      <title>Streamline Security Maintenance with Permanence AI Code Generation Tools</title>
      <description><![CDATA[Watch the podcast to hear Joseph Hackman, Founder and CEO of Permanence, discuss how integrating AI code-checking technology into complex IT environments enhances software development while remediating security vulnerabilities. Discover essential insights into how Permanence’s AI-powered code generation tools address skepticism around AI, simplify security maintenance and optimize resource allocation. 
]]></description>
      <pubDate>Mon, 17 Nov 2025 14:30:14 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Permanence AI, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/streamline-security-maintenance-with-permanence-ai-code-generation-tools-eL5HGXTo</link>
      <enclosure length="27817967" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/aa3638d2-f4f4-4933-8349-a979bfffcc77/audio/a303a5f5-f674-4ee2-975c-03e6f2349502/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Streamline Security Maintenance with Permanence AI Code Generation Tools</itunes:title>
      <itunes:author>Permanence AI, Carahsoft</itunes:author>
      <itunes:duration>00:28:47</itunes:duration>
      <itunes:summary>Watch the podcast to hear Joseph Hackman, Founder and CEO of Permanence, discuss how integrating AI code-checking technology into complex IT environments enhances software development while remediating security vulnerabilities. Discover essential insights into how Permanence’s AI-powered code generation tools address skepticism around AI, simplify security maintenance and optimize resource allocation.</itunes:summary>
      <itunes:subtitle>Watch the podcast to hear Joseph Hackman, Founder and CEO of Permanence, discuss how integrating AI code-checking technology into complex IT environments enhances software development while remediating security vulnerabilities. Discover essential insights into how Permanence’s AI-powered code generation tools address skepticism around AI, simplify security maintenance and optimize resource allocation.</itunes:subtitle>
      <itunes:keywords>permanence ai, code-checking, ai coding assistant, ai code checker, it, maintenance management software, code maintenance tools, it security automation, ai code, ai tools for software engineer, it security, software maintenance, ai code generation tools, ai automation, ai coding agent</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>301</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e8705c91-f20c-4fbf-9c95-818ce53816e6</guid>
      <title>Unlocking FedRAMP with Atlassian Government Cloud</title>
      <description><![CDATA[Unlock the Atlassian and Clovity podcast to hear digital transformation experts discuss how the Atlassian Government Cloud helps agencies unify cloud modernization, AI automation and compliance governance in a FedRAMP Moderate environment.  
]]></description>
      <pubDate>Mon, 10 Nov 2025 18:52:46 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unlocking-fedramp-with-atlassian-government-cloud-BLIUbAYF</link>
      <enclosure length="33163357" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0d7e2093-922a-4c9b-91f2-d7c88e0c51b2/audio/1528b000-2b16-4559-984b-1ec28b984726/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unlocking FedRAMP with Atlassian Government Cloud</itunes:title>
      <itunes:author>Atlassian, Carahsoft</itunes:author>
      <itunes:duration>00:34:32</itunes:duration>
      <itunes:summary>Unlock the Atlassian and Clovity podcast to hear digital transformation experts discuss how the Atlassian Government Cloud helps agencies unify cloud modernization, AI automation and compliance governance in a FedRAMP Moderate environment. </itunes:summary>
      <itunes:subtitle>Unlock the Atlassian and Clovity podcast to hear digital transformation experts discuss how the Atlassian Government Cloud helps agencies unify cloud modernization, AI automation and compliance governance in a FedRAMP Moderate environment. </itunes:subtitle>
      <itunes:keywords>fedramp cloud services, atlassian cloud platform, atlassian, compliance/roadmap, modernization, atlassian jira service management, atlassian fedramp, fedramp, secure government cloud, atlassian jira ai, moderate authorization, atlassian confluence cloud, clovity, digital transformation, ai, government cloud platform</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>300</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d7320d1f-eb27-43cf-8bbb-ea76cc310c72</guid>
      <title>Driving Government Digital Transformation with Atlassian</title>
      <description><![CDATA[Government agencies often rely on outdated legacy systems that hinder cross-departmental collaboration due to fragmented data and operational inefficiencies. Watch the podcast to hear Atlassian and Clovity experts discuss how Government agencies streamline IT modernization with FedRAMP-authorized cloud solutions, powered by Jira, Jira Service Management and Confluence.  
]]></description>
      <pubDate>Mon, 10 Nov 2025 15:32:28 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/driving-government-digital-transformation-with-atlassian-AIeYHyQq</link>
      <enclosure length="38141105" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5d62377d-1e6c-4615-a1c3-5351067ea078/audio/212378c7-ea73-4da0-bac2-1d1c7ed49af6/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Driving Government Digital Transformation with Atlassian</itunes:title>
      <itunes:author>Atlassian, carahsoft</itunes:author>
      <itunes:duration>00:39:32</itunes:duration>
      <itunes:summary>Government agencies often rely on outdated legacy systems that hinder cross-departmental collaboration due to fragmented data and operational inefficiencies. Watch the podcast to hear Atlassian and Clovity experts discuss how Government agencies streamline IT modernization with FedRAMP-authorized cloud solutions, powered by Jira, Jira Service Management and Confluence. </itunes:summary>
      <itunes:subtitle>Government agencies often rely on outdated legacy systems that hinder cross-departmental collaboration due to fragmented data and operational inefficiencies. Watch the podcast to hear Atlassian and Clovity experts discuss how Government agencies streamline IT modernization with FedRAMP-authorized cloud solutions, powered by Jira, Jira Service Management and Confluence. </itunes:subtitle>
      <itunes:keywords>atlassian, modernize legacy systems, modernization, atlassian jira, jira service management, strategy, jira, confluence, government digital transformation, digital cloud transformation, legacy system transformation, atlassian confluence cloud, itsm digital transformation, clovity, digital transformation, cloud migration tools</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>299</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e33c8b89-6130-412b-8be9-1e286492d505</guid>
      <title>Atlassian Modernizes IT Service Management for Higher Education</title>
      <description><![CDATA[Access the podcast to hear Atlassian and Clovity experts discuss how to accelerate digital transformation for higher education organizations through compliant ITSM and digital collaboration tools, like Jira Service Management, Confluence and Loom. Explore how Atlassian enhances visibility and service delivery in higher education with practical use cases for ITSM, facilities, HR, legal and research. 
]]></description>
      <pubDate>Thu, 6 Nov 2025 21:43:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Clovity, Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/atlassian-modernizes-it-service-management-for-higher-education-_jhweKWb</link>
      <enclosure length="22637977" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e9b54d13-d634-4f19-b999-5998f8813a49/audio/f48202ae-507a-4a52-901f-d09e3567cd03/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Atlassian Modernizes IT Service Management for Higher Education</itunes:title>
      <itunes:author>Clovity, Carahsoft, Atlassian</itunes:author>
      <itunes:duration>00:23:25</itunes:duration>
      <itunes:summary>Access the podcast to hear Atlassian and Clovity experts discuss how to accelerate digital transformation for higher education organizations through compliant ITSM and digital collaboration tools, like Jira Service Management, Confluence and Loom. Explore how Atlassian enhances visibility and service delivery in higher education with practical use cases for ITSM, facilities, HR, legal and research.</itunes:summary>
      <itunes:subtitle>Access the podcast to hear Atlassian and Clovity experts discuss how to accelerate digital transformation for higher education organizations through compliant ITSM and digital collaboration tools, like Jira Service Management, Confluence and Loom. Explore how Atlassian enhances visibility and service delivery in higher education with practical use cases for ITSM, facilities, HR, legal and research.</itunes:subtitle>
      <itunes:keywords>collaboration tools for education, atlassian, cloud migration for education, itsm, itsm for higher education, jira service management, atlassian collaboration tools, higher ed, atlassian for education, jira service management itsm, managed it services for higher education, clovity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>298</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cb0252a4-b033-4a33-9e45-41ad8e984fe1</guid>
      <title>Streamline Atlassian Software Licensing and Procurement with Clovity and Carahsoft</title>
      <description><![CDATA[Access the Atlassian podcast to explore how Carahsoft simplifies co-terms, contract management, renewals, discounts and procurement requirements while Clovity accelerates software delivery and implementation. 
]]></description>
      <pubDate>Thu, 6 Nov 2025 21:26:23 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/streamline-atlassian-software-licensing-and-procurement-with-clovity-and-carahsoft-uJjVIalb</link>
      <enclosure length="12799727" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/3bca3c7c-063c-4635-be13-1e4a05e80618/audio/77bd3441-e91d-47cc-9593-7b96d002e0c5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Streamline Atlassian Software Licensing and Procurement with Clovity and Carahsoft</itunes:title>
      <itunes:author>Carahsoft, Atlassian</itunes:author>
      <itunes:duration>00:13:09</itunes:duration>
      <itunes:summary>Access the Atlassian podcast to explore how Carahsoft simplifies co-terms, contract management, renewals, discounts and procurement requirements while Clovity accelerates software delivery and implementation.</itunes:summary>
      <itunes:subtitle>Access the Atlassian podcast to explore how Carahsoft simplifies co-terms, contract management, renewals, discounts and procurement requirements while Clovity accelerates software delivery and implementation.</itunes:subtitle>
      <itunes:keywords>atlassian software license, software license procurement process, atlassian, software licensing, software license compliance, software license renewal process, government contract vehicles, atlassian license management, government contract management, atlassian contract management, atlassian licensing, software license management, software license implementation, contract vehicles, clovity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>297</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">acca2eba-ff1c-46a3-a176-d714475b5f7c</guid>
      <title>Scaling Networks: Insights from Juniper</title>
      <description><![CDATA[This podcast dives into how AI is reshaping data center networking, as Juniper’s Greg Bensimon discusses high-density compute, cutting-edge cooling, scalable architectures, and the battle between InfiniBand and Ethernet, along with zero-trust security and AI-driven operations. 
]]></description>
      <pubDate>Thu, 30 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Juniper Networks)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/innovation-in-networking-juniper-networks-3e8rOyEO</link>
      <enclosure length="42928316" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/35c6021f-09d8-4889-a54d-2bdb6771a006/audio/fb5b6191-7b8a-42a6-9764-af72f8a61368/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Scaling Networks: Insights from Juniper</itunes:title>
      <itunes:author>Carahsoft, Juniper Networks</itunes:author>
      <itunes:duration>00:44:30</itunes:duration>
      <itunes:summary>This podcast dives into how AI is reshaping data center networking, as Juniper’s Greg Bensimon discusses high-density compute, cutting-edge cooling, scalable architectures, and the battle between InfiniBand and Ethernet, along with zero-trust security and AI-driven operations.</itunes:summary>
      <itunes:subtitle>This podcast dives into how AI is reshaping data center networking, as Juniper’s Greg Bensimon discusses high-density compute, cutting-edge cooling, scalable architectures, and the battle between InfiniBand and Ethernet, along with zero-trust security and AI-driven operations.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, cloud and ai solutions for agencies practices for education, it infrastructure trends, public sector digital transformation strategies, data center trends, data center best, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>289</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f5cb5ad-f86d-41a6-bd58-e6c1fb1f8bcf</guid>
      <title>Securely Transforming Higher Education with the Atlassian Cloud Platform Part 1</title>
      <description><![CDATA[Access the podcast to hear digital transformation experts discuss how UConn adopted the Atlassian cloud platform to modernize IT infrastructure, scale service delivery and centralize institutional assets. Learn how your organization can optimize learning and administrative environments with Atlassian's secure cloud services, powered by Jira Service Management, Confluence and Assets. 
]]></description>
      <pubDate>Tue, 28 Oct 2025 18:29:07 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/securely-transforming-higher-education-with-the-atlassian-cloud-platform-part-1-9p09IHsb</link>
      <enclosure length="19427808" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ebeb2917-7677-4d6e-ad36-dd10d5c2d426/audio/06ff061f-825d-42b4-acd3-4433a038e8f4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Securely Transforming Higher Education with the Atlassian Cloud Platform Part 1</itunes:title>
      <itunes:author>Carahsoft, Atlassian</itunes:author>
      <itunes:duration>00:19:56</itunes:duration>
      <itunes:summary>Access the podcast to hear digital transformation experts discuss how UConn adopted the Atlassian cloud platform to modernize IT infrastructure, scale service delivery and centralize institutional assets. Learn how your organization can optimize learning and administrative environments with Atlassian&apos;s secure cloud services, powered by Jira Service Management, Confluence and Assets.</itunes:summary>
      <itunes:subtitle>Access the podcast to hear digital transformation experts discuss how UConn adopted the Atlassian cloud platform to modernize IT infrastructure, scale service delivery and centralize institutional assets. Learn how your organization can optimize learning and administrative environments with Atlassian&apos;s secure cloud services, powered by Jira Service Management, Confluence and Assets.</itunes:subtitle>
      <itunes:keywords>atlassian cloud platform, unifying service delivery in higher education, streamlining operations through collaboration and automation, digital transformation in higher education, from fragmented workflows to a unified university system, atlassian jira and confluence, atlassian jira service management, atlassian for education, breaking down it silos across departments, building a digital campus powered by atlassian, confluence cloud migration, asset and configuration management, transforming student and faculty support with jira service management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>295</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8b69e35f-024c-4568-b444-a63314949c98</guid>
      <title>Networking Reinvented: A Conversation with Nokia</title>
      <description><![CDATA[This podcast details how Nokia equips federal data centers for massive AI workloads with lossless, high-bandwidth networks, event-driven automation, and quantum-resistant encryption, leveraging Ultra Ethernet Consortium standards and U.S. security certifications to maximize GPU utilization and support classified DoD deployments. 
]]></description>
      <pubDate>Tue, 28 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nokia, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/innovation-in-networking-nokia-M19kl1F1</link>
      <enclosure length="37917426" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e580bd21-1407-486a-a1b0-9406d0d1ec84/audio/6fc9bc5d-35e8-4191-8a6b-6226aaa20015/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Networking Reinvented: A Conversation with Nokia</itunes:title>
      <itunes:author>Nokia, Carahsoft</itunes:author>
      <itunes:duration>00:39:15</itunes:duration>
      <itunes:summary>This podcast details how Nokia equips federal data centers for massive AI workloads with lossless, high-bandwidth networks, event-driven automation, and quantum-resistant encryption, leveraging Ultra Ethernet Consortium standards and U.S. security certifications to maximize GPU utilization and support classified DoD deployments.</itunes:summary>
      <itunes:subtitle>This podcast details how Nokia equips federal data centers for massive AI workloads with lossless, high-bandwidth networks, event-driven automation, and quantum-resistant encryption, leveraging Ultra Ethernet Consortium standards and U.S. security certifications to maximize GPU utilization and support classified DoD deployments.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, cloud and ai solutions for agencies practices for education, it infrastructure trends, public sector digital transformation strategies, data center trends, data center best, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>288</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">327c57c8-279e-4660-b412-2af7fa183ed1</guid>
      <title>Safeguarding Federal Websites with Fortra Brand Protection</title>
      <description><![CDATA[Discover how Fortra helps agencies monitor, detect & block domain impersonation attacks with phishing prevention best practices. Watch the podcast today! 
]]></description>
      <pubDate>Mon, 27 Oct 2025 19:54:37 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Fortra, domain impersonation, phishing, look-alike, protect sensitive data, fortra phishlabs, fortra Brand Protection, domain impersonation protection, phishing prevention best practices, domain monitoring service, domain monitoring tools, brand protection services, cybersecurity, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/safeguarding-federal-websites-with-fortra-brand-protection-XdPAgi2j</link>
      <enclosure length="37679105" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/be93d03c-68e6-41e3-999d-87398b91a64c/audio/d2ea71b6-739c-425b-a79d-f54b09bc5f86/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Safeguarding Federal Websites with Fortra Brand Protection</itunes:title>
      <itunes:author>Fortra, domain impersonation, phishing, look-alike, protect sensitive data, fortra phishlabs, fortra Brand Protection, domain impersonation protection, phishing prevention best practices, domain monitoring service, domain monitoring tools, brand protection services, cybersecurity, Carahsoft</itunes:author>
      <itunes:duration>00:39:13</itunes:duration>
      <itunes:summary>Discover how Fortra helps agencies monitor, detect &amp; block domain impersonation attacks with phishing prevention best practices. Watch the podcast today!</itunes:summary>
      <itunes:subtitle>Discover how Fortra helps agencies monitor, detect &amp; block domain impersonation attacks with phishing prevention best practices. Watch the podcast today!</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>294</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">faf011ee-fa7d-4db7-bf5a-d8ab93e41f5b</guid>
      <title>High-Performance Compute: AMD in Focus</title>
      <description><![CDATA[This podcast discusses how AMD is modernizing data centers with open standards, AI-ready hardware, and a broad CPU, GPU, and FPGA portfolio, while executives highlight supply-chain strategies, open-source investments, and partnerships that boost performance, cut costs, and maximize space. 
]]></description>
      <pubDate>Fri, 24 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AMD, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-computing-amd-D8WMTVvu</link>
      <enclosure length="35805083" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/746d9d4d-2f64-4c09-98fb-911a2c7aac4b/audio/951cdd90-692e-41f5-92dc-a06e0088809d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>High-Performance Compute: AMD in Focus</itunes:title>
      <itunes:author>AMD, Carahsoft</itunes:author>
      <itunes:duration>00:37:05</itunes:duration>
      <itunes:summary>This podcast discusses how AMD is modernizing data centers with open standards, AI-ready hardware, and a broad CPU, GPU, and FPGA portfolio, while executives highlight supply-chain strategies, open-source investments, and partnerships that boost performance, cut costs, and maximize space.</itunes:summary>
      <itunes:subtitle>This podcast discusses how AMD is modernizing data centers with open standards, AI-ready hardware, and a broad CPU, GPU, and FPGA portfolio, while executives highlight supply-chain strategies, open-source investments, and partnerships that boost performance, cut costs, and maximize space.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, cloud and ai solutions for agencies practices for education, it infrastructure trends, public sector digital transformation strategies, data center trends, data center best, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>287</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d63475d3-deae-4d8f-8381-679298c509d1</guid>
      <title>Unlocking Performance: The Future of Data Centers in the Public Sector with Equinix – Episode 2: Hybrid Multicloud Networking Sales Play</title>
      <description><![CDATA[Unlock the Equinix podcast series to hear high-performance data center experts discuss how secure cloud architecture and edge data centers are driving innovation and cyber resilience in the Public Sector. Explore how Equinix Fabric and Network Edge enhance operational efficiency and security through colocation and hybrid multicloud strategies while maintaining regulatory compliance. 
]]></description>
      <pubDate>Fri, 24 Oct 2025 13:54:42 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unlocking-performance-the-future-of-data-centers-in-the-public-sector-with-equinix-episode-2-hybrid-multicloud-networking-sales-play-hqcOP_bV</link>
      <enclosure length="20842150" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e351d62e-75fd-4358-afbf-ba9f55f7172b/audio/e4727bb5-0e25-401e-9d6f-cab3b9118ed2/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unlocking Performance: The Future of Data Centers in the Public Sector with Equinix – Episode 2: Hybrid Multicloud Networking Sales Play</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:21:42</itunes:duration>
      <itunes:summary>Unlock the Equinix podcast series to hear high-performance data center experts discuss how secure cloud architecture and edge data centers are driving innovation and cyber resilience in the Public Sector. Explore how Equinix Fabric and Network Edge enhance operational efficiency and security through colocation and hybrid multicloud strategies while maintaining regulatory compliance.</itunes:summary>
      <itunes:subtitle>Unlock the Equinix podcast series to hear high-performance data center experts discuss how secure cloud architecture and edge data centers are driving innovation and cyber resilience in the Public Sector. Explore how Equinix Fabric and Network Edge enhance operational efficiency and security through colocation and hybrid multicloud strategies while maintaining regulatory compliance.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>293</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">12dea9c2-5487-47e6-b556-191b140cf4a5</guid>
      <title>Inside Intel: Shaping the Future of Compute</title>
      <description><![CDATA[Intel’s Dr. Darren Pulsipher explains how AI’s rapid growth drives innovation but raises energy concerns, emphasizing smaller CPU-based models that cut costs and power use while urging experimentation with AI and strong data management skills to stay competitive. 
]]></description>
      <pubDate>Wed, 22 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Intel, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-computing-intel-n2Y05bZh</link>
      <enclosure length="31289508" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1a198b6d-5faa-4a0f-bcc3-a49165407547/audio/d429bf2f-89bb-4895-8ebb-de1b6d6595c4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Inside Intel: Shaping the Future of Compute</itunes:title>
      <itunes:author>Intel, Carahsoft</itunes:author>
      <itunes:duration>00:32:20</itunes:duration>
      <itunes:summary>Intel’s Dr. Darren Pulsipher explains how AI’s rapid growth drives innovation but raises energy concerns, emphasizing smaller CPU-based models that cut costs and power use while urging experimentation with AI and strong data management skills to stay competitive.</itunes:summary>
      <itunes:subtitle>Intel’s Dr. Darren Pulsipher explains how AI’s rapid growth drives innovation but raises energy concerns, emphasizing smaller CPU-based models that cut costs and power use while urging experimentation with AI and strong data management skills to stay competitive.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>286</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aacd4ad1-2ccc-4cee-b5d8-04c8ed805fc8</guid>
      <title>Advancing Compute: HPE’s Innovations</title>
      <description><![CDATA[This podcast examines how HPE is meeting AI’s soaring compute demands with CPU/GPU advances, hybrid cloud models, and Neo cloud services that enable faster upgrades, liquid cooling, and flexible, consumption-based infrastructure. 
]]></description>
      <pubDate>Mon, 20 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (HPE, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-computing-hpe-Yq_EF254</link>
      <enclosure length="35917738" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/dff40932-335f-498a-9cb9-c757bbf34e3a/audio/42fa8da5-7960-4b5d-882b-6d2e8c88a53f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Advancing Compute: HPE’s Innovations</itunes:title>
      <itunes:author>HPE, Carahsoft</itunes:author>
      <itunes:duration>00:37:12</itunes:duration>
      <itunes:summary>This podcast examines how HPE is meeting AI’s soaring compute demands with CPU/GPU advances, hybrid cloud models, and Neo cloud services that enable faster upgrades, liquid cooling, and flexible, consumption-based infrastructure.</itunes:summary>
      <itunes:subtitle>This podcast examines how HPE is meeting AI’s soaring compute demands with CPU/GPU advances, hybrid cloud models, and Neo cloud services that enable faster upgrades, liquid cooling, and flexible, consumption-based infrastructure.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>285</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9e7f569e-9622-44f9-9ee3-4a0cfa81ec4d</guid>
      <title>Beyond Traditional Storage: VAST in the Spotlight</title>
      <description><![CDATA[This podcast features VAST Data’s Jeff Denworth and Randy Hayes detailing their “operating system for AI,” a disaggregated, full-stack platform integrating exabyte-scale NVMe storage, high-performance databases, GPU-optimized compute, and vector search to support AI training, fine-tuning, and agentic workflows, with automated data curation, auditability, and federal zero-trust compliance to prevent data poisoning and enable secure, large-scale analytics. 
]]></description>
      <pubDate>Fri, 17 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VAST Data, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-storage-vast-data-ENI_6bxZ</link>
      <enclosure length="46292066" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9b90d1ea-3e93-4d3c-82c2-590c8935f201/audio/076d613b-270e-46d1-bb41-81486584db66/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Beyond Traditional Storage: VAST in the Spotlight</itunes:title>
      <itunes:author>VAST Data, Carahsoft</itunes:author>
      <itunes:duration>00:48:00</itunes:duration>
      <itunes:summary>This podcast features VAST Data’s Jeff Denworth and Randy Hayes detailing their “operating system for AI,” a disaggregated, full-stack platform integrating exabyte-scale NVMe storage, high-performance databases, GPU-optimized compute, and vector search to support AI training, fine-tuning, and agentic workflows, with automated data curation, auditability, and federal zero-trust compliance to prevent data poisoning and enable secure, large-scale analytics.</itunes:summary>
      <itunes:subtitle>This podcast features VAST Data’s Jeff Denworth and Randy Hayes detailing their “operating system for AI,” a disaggregated, full-stack platform integrating exabyte-scale NVMe storage, high-performance databases, GPU-optimized compute, and vector search to support AI training, fine-tuning, and agentic workflows, with automated data curation, auditability, and federal zero-trust compliance to prevent data poisoning and enable secure, large-scale analytics.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>284</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1325a623-5a19-496e-b569-3f3bd4e207fd</guid>
      <title>Ensuring CMMC Compliance with PC Matic’s Automated Application Allowlisting Software</title>
      <description><![CDATA[Access the application allowlisting podcast to discover how PC Matic helps Government and Education organizations meet NIST 800-171 and CMMC requirements while boosting system performance. Explore best practices and practical use cases for scaling endpoint security with innovative tools that identify assets, assess system vulnerabilities and control the attack surface across hybrid and cloud environments. 
]]></description>
      <pubDate>Thu, 16 Oct 2025 15:20:22 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (PC Matic, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ensuring-cmmc-compliance-with-pc-matics-automated-application-allowlisting-software-z2UL1DkG</link>
      <enclosure length="44224810" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d263fc86-f3bb-464c-a1de-44c823164850/audio/6839241e-9b1a-43ab-89ab-be9a982dfb11/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ensuring CMMC Compliance with PC Matic’s Automated Application Allowlisting Software</itunes:title>
      <itunes:author>PC Matic, Carahsoft</itunes:author>
      <itunes:duration>00:46:03</itunes:duration>
      <itunes:summary>Access the application allowlisting podcast to discover how PC Matic helps Government and Education organizations meet NIST 800-171 and CMMC requirements while boosting system performance. Explore best practices and practical use cases for scaling endpoint security with innovative tools that identify assets, assess system vulnerabilities and control the attack surface across hybrid and cloud environments.</itunes:summary>
      <itunes:subtitle>Access the application allowlisting podcast to discover how PC Matic helps Government and Education organizations meet NIST 800-171 and CMMC requirements while boosting system performance. Explore best practices and practical use cases for scaling endpoint security with innovative tools that identify assets, assess system vulnerabilities and control the attack surface across hybrid and cloud environments.</itunes:subtitle>
      <itunes:keywords>cui, usa-based support, endpoint protection, application allowlisting, cmmc compliance, endpoint security software, automated application allowlisting for it &amp; ot, policy-driven, application allowlisting software, assessing security requirements for controlled unclassified information, cybersecurity, pc matic antivirus</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>292</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28dc877c-9e2e-4b40-ab61-e891c34b7e17</guid>
      <title>Achieving AI-Powered Portfolio Management for Federal Agencies</title>
      <description><![CDATA[Watch the podcast to hear experts from Broadcom, Google Cloud and stackArmor discuss how agencies accelerate software delivery, improve customer experience and maintain compliance while meeting deadlines and staying within budget. Gain insights into how the Federal Government navigates FedRAMP’s evolving framework, leverages AI tools for portfolio management and breaks down information silos with a unified platform. 
]]></description>
      <pubDate>Wed, 15 Oct 2025 16:11:13 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Broadcom, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/achieving-ai-powered-portfolio-management-for-federal-agencies-EVEXoKBj</link>
      <enclosure length="40295369" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e0106381-1e51-4c2e-955a-e82e3de521c9/audio/370cda5d-7f0e-4eac-9c6e-92290b90b6d5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Achieving AI-Powered Portfolio Management for Federal Agencies</itunes:title>
      <itunes:author>Broadcom, Carahsoft</itunes:author>
      <itunes:duration>00:41:57</itunes:duration>
      <itunes:summary>Watch the podcast to hear experts from Broadcom, Google Cloud and stackArmor discuss how agencies accelerate software delivery, improve customer experience and maintain compliance while meeting deadlines and staying within budget. Gain insights into how the Federal Government navigates FedRAMP’s evolving framework, leverages AI tools for portfolio management and breaks down information silos with a unified platform.</itunes:summary>
      <itunes:subtitle>Watch the podcast to hear experts from Broadcom, Google Cloud and stackArmor discuss how agencies accelerate software delivery, improve customer experience and maintain compliance while meeting deadlines and staying within budget. Gain insights into how the Federal Government navigates FedRAMP’s evolving framework, leverages AI tools for portfolio management and breaks down information silos with a unified platform.</itunes:subtitle>
      <itunes:keywords>fedramp security assessment framework, data management, strategic portfolio management, cloud security, citizen centric services, government digital experience, ai-powered productivity tools, budget, compliance, fitara, fedramp, efficiency, ai portfolio management software, software delivery, multi-cloud, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>291</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0574cf38-a390-48d7-8ece-fcad64f38418</guid>
      <title>Next-Level Storage: Insights from NetApp</title>
      <description><![CDATA[This podcast explores how NetApp is tackling soaring storage demands, as CTO Jim Cosby highlights intelligent data infrastructure, built-in ransomware protection, and AI-ready storage strategies that help public agencies manage massive datasets securely and efficiently. 
]]></description>
      <pubDate>Wed, 15 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (NetApp, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-storage-netapp-CBt549mS</link>
      <enclosure length="42462680" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/89fb2bfd-417e-420f-bfa0-dd91f5bcd6db/audio/e74dce29-4ee5-405f-bdf9-abdaa1a83995/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Next-Level Storage: Insights from NetApp</itunes:title>
      <itunes:author>NetApp, Carahsoft</itunes:author>
      <itunes:duration>00:43:59</itunes:duration>
      <itunes:summary>This podcast explores how NetApp is tackling soaring storage demands, as CTO Jim Cosby highlights intelligent data infrastructure, built-in ransomware protection, and AI-ready storage strategies that help public agencies manage massive datasets securely and efficiently.</itunes:summary>
      <itunes:subtitle>This podcast explores how NetApp is tackling soaring storage demands, as CTO Jim Cosby highlights intelligent data infrastructure, built-in ransomware protection, and AI-ready storage strategies that help public agencies manage massive datasets securely and efficiently.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>283</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d54cbb84-6b33-4c31-b839-d2e88016fe4e</guid>
      <title>Navigating SAP GRC 2026 with Pathlock Cloud</title>
      <description><![CDATA[Access the Pathlock podcast to hear an expert in GRC discuss how to simplify compliance and reduce operational risk by combining SAP identity management (IDM) and access control solutions on a single platform. Learn how agencies are leveraging integrated GRC solutions to future-proof SAP environments, simplify critical operations and optimize user experience. 
]]></description>
      <pubDate>Mon, 13 Oct 2025 14:39:59 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Pathlock, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/navigating-sap-grc-2026-with-pathlock-cloud-hMl4geUA</link>
      <enclosure length="36632376" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0425ebb3-ac4c-4486-8633-7529d371a85d/audio/d280fbd2-5a82-4d62-9c72-96b13978e16d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Navigating SAP GRC 2026 with Pathlock Cloud</itunes:title>
      <itunes:author>Pathlock, Carahsoft</itunes:author>
      <itunes:duration>00:38:07</itunes:duration>
      <itunes:summary>Access the Pathlock podcast to hear an expert in GRC discuss how to simplify compliance and reduce operational risk by combining SAP identity management (IDM) and access control solutions on a single platform. Learn how agencies are leveraging integrated GRC solutions to future-proof SAP environments, simplify critical operations and optimize user experience.</itunes:summary>
      <itunes:subtitle>Access the Pathlock podcast to hear an expert in GRC discuss how to simplify compliance and reduce operational risk by combining SAP identity management (IDM) and access control solutions on a single platform. Learn how agencies are leveraging integrated GRC solutions to future-proof SAP environments, simplify critical operations and optimize user experience.</itunes:subtitle>
      <itunes:keywords>pathlock grc, sap grc 2026, sap grc strategy roadmap, sap security solutions, sap idm, sap grc end-of-life, sap governance risk and compliance, pathlock, sap idm end-of-life, sap grc, pathlock sap, sap end-of-life, sap end of life</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>290</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f421f218-ab20-4113-9f40-e91fdf634f86</guid>
      <title>Unlocking Storage Innovation: Dell in Focus</title>
      <description><![CDATA[This podcast highlights how Dell Technologies is advancing data center computing with its AI Factory, multi-cloud strategy, and disaggregated infrastructure to give federal customers flexible, cost-efficient, and secure IT solutions. 
]]></description>
      <pubDate>Mon, 13 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Dell Technologies, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-storage-dell-sEvMCwQq</link>
      <enclosure length="39916456" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/60ff0505-90e3-4e50-b3a5-0b9462c9d88d/audio/4de3fda8-64fe-41f5-a694-096d987dd74f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unlocking Storage Innovation: Dell in Focus</itunes:title>
      <itunes:author>Dell Technologies, Carahsoft</itunes:author>
      <itunes:duration>00:41:21</itunes:duration>
      <itunes:summary>This podcast highlights how Dell Technologies is advancing data center computing with its AI Factory, multi-cloud strategy, and disaggregated infrastructure to give federal customers flexible, cost-efficient, and secure IT solutions.</itunes:summary>
      <itunes:subtitle>This podcast highlights how Dell Technologies is advancing data center computing with its AI Factory, multi-cloud strategy, and disaggregated infrastructure to give federal customers flexible, cost-efficient, and secure IT solutions.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>282</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6f035138-4cd2-4baf-b777-f2da6a284098</guid>
      <title>Scaling Infrastructure: A Deep Dive with Equinix</title>
      <description><![CDATA[This podcast highlights how Equinix serves as a global hub for digital infrastructure, connecting networks, cloud providers, and public sector organizations while supporting AI power needs and expanding government reach through its partnership with Carahsoft. 
]]></description>
      <pubDate>Thu, 9 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Equinix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-infrastructure-equinix-HzxBQHSk</link>
      <enclosure length="42330918" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e56227cc-7e0a-4bd3-85a3-61b42437cc9a/audio/39b9bb28-44e9-47c2-b3c1-f118817343e7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Scaling Infrastructure: A Deep Dive with Equinix</itunes:title>
      <itunes:author>Equinix, Carahsoft</itunes:author>
      <itunes:duration>00:43:52</itunes:duration>
      <itunes:summary>This podcast highlights how Equinix serves as a global hub for digital infrastructure, connecting networks, cloud providers, and public sector organizations while supporting AI power needs and expanding government reach through its partnership with Carahsoft.</itunes:summary>
      <itunes:subtitle>This podcast highlights how Equinix serves as a global hub for digital infrastructure, connecting networks, cloud providers, and public sector organizations while supporting AI power needs and expanding government reach through its partnership with Carahsoft.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>281</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fabb577c-1f73-45df-8592-3f5ae437b015</guid>
      <title>Reimagining Infrastructure: Vertiv’s Approach</title>
      <description><![CDATA[This podcast examines how AI and high-performance computing are driving data centers to power densities of 300 kW+ per rack, as Vertiv’s Bob Silkowitz details advanced liquid cooling, modular containerized designs, and power strategies ranging from nuclear to gas turbines, along with dark-fiber connectivity and Carahsoft partnerships for scalable, sustainable federal infrastructure. 
]]></description>
      <pubDate>Tue, 7 Oct 2025 14:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Vertiv, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-center-innovation-in-infrastructure-vertiv-VOPQQF5b</link>
      <enclosure length="30350768" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/58e66118-64c0-4eff-ab96-4066dff9235f/audio/20073b9f-f9a7-47d7-a950-3ebc3f472305/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Reimagining Infrastructure: Vertiv’s Approach</itunes:title>
      <itunes:author>Vertiv, Carahsoft</itunes:author>
      <itunes:duration>00:31:22</itunes:duration>
      <itunes:summary>This podcast examines how AI and high-performance computing are driving data centers to power densities of 300 kW+ per rack, as Vertiv’s Bob Silkowitz details advanced liquid cooling, modular containerized designs, and power strategies ranging from nuclear to gas turbines, along with dark-fiber connectivity and Carahsoft partnerships for scalable, sustainable federal infrastructure.</itunes:summary>
      <itunes:subtitle>This podcast examines how AI and high-performance computing are driving data centers to power densities of 300 kW+ per rack, as Vertiv’s Bob Silkowitz details advanced liquid cooling, modular containerized designs, and power strategies ranging from nuclear to gas turbines, along with dark-fiber connectivity and Carahsoft partnerships for scalable, sustainable federal infrastructure.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>280</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c2e5f192-bfd7-4dcd-910e-6493b5eca009</guid>
      <title>State of the Data Center Today: Dell &amp; NVIDIA</title>
      <description><![CDATA[This podcast explores the rise of AI factories - data centers built to convert energy and data into AI “tokens” - as NVIDIA and Dell detail how federal agencies must rethink power, cooling, and compute while leveraging their AI Factory partnership to scale token generation, speed model training, and extend hardware performance for massive AI workloads. 
]]></description>
      <pubDate>Thu, 2 Oct 2025 13:59:01 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (NVIDIA, Carahsoft, Dell Technologies)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/state-of-the-data-center-today-dell-nvidia-zKUzybFK</link>
      <enclosure length="43999264" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/65b5a61f-791d-43f5-bbdc-1d70ccc0600f/audio/51953a5a-2cdd-49e1-9c3c-33e0e88e8dd5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>State of the Data Center Today: Dell &amp; NVIDIA</itunes:title>
      <itunes:author>NVIDIA, Carahsoft, Dell Technologies</itunes:author>
      <itunes:duration>00:45:36</itunes:duration>
      <itunes:summary>This podcast explores the rise of AI factories - data centers built to convert energy and data into AI “tokens” - as NVIDIA and Dell detail how federal agencies must rethink power, cooling, and compute while leveraging their AI Factory partnership to scale token generation, speed model training, and extend hardware performance for massive AI workloads.</itunes:summary>
      <itunes:subtitle>This podcast explores the rise of AI factories - data centers built to convert energy and data into AI “tokens” - as NVIDIA and Dell detail how federal agencies must rethink power, cooling, and compute while leveraging their AI Factory partnership to scale token generation, speed model training, and extend hardware performance for massive AI workloads.</itunes:subtitle>
      <itunes:keywords>government it security and efficiency, data center strategy, data center automation tools, data center best practices for education, data center podcast, modernizing government data centers, public sector it infrastructure trends, modern data center architecture, it infrastructure trends, cloud and ai solutions for agencies, public sector digital transformation strategies, data center trends, data center innovation, data center innovation for government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>279</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d6254349-0a63-4c35-9481-c473518fcfff</guid>
      <title>Dive Into VCF 9</title>
      <description><![CDATA[Join us on CarahCast as Ethan Palmer and Nick Wager from Carahsoft breaks down VMware Cloud Foundation 9. Learn about the new graphical installer, unified VCF Operations for easier management, memory tiering to NVMe, GPU enhancements, vSAN deduplication, modern networking with virtual private clouds, and updated licensing. This episode is packed with insights for IT professionals looking to streamline deployments, boost performance, and maximize flexibility in their private cloud environments. 
]]></description>
      <pubDate>Thu, 25 Sep 2025 17:41:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/dive-into-vcf-9-bV3hTx6r</link>
      <enclosure length="18604796" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4fdd20e5-20b7-481b-b4bd-8773560bf052/audio/e9d4e8a3-afa1-42e1-b984-6e03976e6a3a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Dive Into VCF 9</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:19:11</itunes:duration>
      <itunes:summary>Join us on CarahCast as Ethan Palmer and Nick Wager from Carahsoft breaks down VMware Cloud Foundation 9. Learn about the new graphical installer, unified VCF Operations for easier management, memory tiering to NVMe, GPU enhancements, vSAN deduplication, modern networking with virtual private clouds, and updated licensing. This episode is packed with insights for IT professionals looking to streamline deployments, boost performance, and maximize flexibility in their private cloud environments.</itunes:summary>
      <itunes:subtitle>Join us on CarahCast as Ethan Palmer and Nick Wager from Carahsoft breaks down VMware Cloud Foundation 9. Learn about the new graphical installer, unified VCF Operations for easier management, memory tiering to NVMe, GPU enhancements, vSAN deduplication, modern networking with virtual private clouds, and updated licensing. This episode is packed with insights for IT professionals looking to streamline deployments, boost performance, and maximize flexibility in their private cloud environments.</itunes:subtitle>
      <itunes:keywords>cost optimization, infrastructure modernization, cloud, digital library, licensing transition, vmware cloud foundation, cloud computing, data center, broadcom, artificial intelligence, application modernization, hybrid cloud, automation, private cloud, operational excellence, security policies, subscription model, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>278</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f2ce9637-331a-41ab-95f9-7ec6264ce999</guid>
      <title>Introduction to HIPAA Compliance is Software Development</title>
      <description><![CDATA[This podcast series is aimed at educating healthcare services and insurance companies about HIPAA compliance in the context of development and test data. Each episode focuses on key aspects of compliance, addressing technical, legal, and ethical challenges. 
]]></description>
      <pubDate>Tue, 23 Sep 2025 14:17:59 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/comparing-both-methods-safe-harbor-and-expert-determination-pt2-iGWNUsdn</link>
      <enclosure length="13133751" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/a7f3beb9-0f28-4343-a4b6-619b1c237c84/audio/a8733674-7ad8-41a5-b5a1-9a4e53b06969/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Introduction to HIPAA Compliance is Software Development</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:13:40</itunes:duration>
      <itunes:summary>This podcast series is aimed at educating healthcare services and insurance companies about HIPAA compliance in the context of development and test data. Each episode focuses on key aspects of compliance, addressing technical, legal, and ethical challenges.</itunes:summary>
      <itunes:subtitle>This podcast series is aimed at educating healthcare services and insurance companies about HIPAA compliance in the context of development and test data. Each episode focuses on key aspects of compliance, addressing technical, legal, and ethical challenges.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>277</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">daf0520d-5e39-4c93-af3c-070bbbfd77d2</guid>
      <title>Introduction to HIPAA Compliance in Software Development</title>
      <description><![CDATA[This podcast series is aimed at educating healthcare services and insurance companies about HIPAA compliance in the context of development and test data. Each episode focuses on key aspects of compliance, addressing technical, legal, and ethical challenges. 
]]></description>
      <pubDate>Mon, 22 Sep 2025 21:30:57 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/introduction-to-hipaa-compliance-is-software-development-R1nUcQOn</link>
      <enclosure length="16282655" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5afd600d-8d1c-4b7f-93a6-3198b3851299/audio/7a31a1a1-0e10-4550-b7de-a9fa00e91eaa/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Introduction to HIPAA Compliance in Software Development</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:16:57</itunes:duration>
      <itunes:summary>This podcast series is aimed at educating healthcare services and insurance companies about HIPAA compliance in the context of development and test data. Each episode focuses on key aspects of compliance, addressing technical, legal, and ethical challenges.</itunes:summary>
      <itunes:subtitle>This podcast series is aimed at educating healthcare services and insurance companies about HIPAA compliance in the context of development and test data. Each episode focuses on key aspects of compliance, addressing technical, legal, and ethical challenges.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>276</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c0d3802f-a714-438c-b3c9-424231f6fc9a</guid>
      <title>Strategic Partnerships Delivering Mission-Critical Technology to the U.S. Navy</title>
      <description><![CDATA[Listen to the LYME Navy Podcast to discover how industry and Government partners are enabling mission success! 
]]></description>
      <pubDate>Fri, 12 Sep 2025 19:11:07 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (LYME, Dell Technologies, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/strategic-partnerships-delivering-mission-critical-technology-to-the-us-navy-twM86Q4Y</link>
      <enclosure length="13181574" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d3bc6003-ea84-49df-a213-8a944008ef7d/audio/1201a994-8118-45a8-89d5-d0fbe8c168b5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Strategic Partnerships Delivering Mission-Critical Technology to the U.S. Navy</itunes:title>
      <itunes:author>LYME, Dell Technologies, Carahsoft</itunes:author>
      <itunes:duration>00:13:29</itunes:duration>
      <itunes:summary>Listen to the LYME Navy Podcast to discover how industry and Government partners are enabling mission success!</itunes:summary>
      <itunes:subtitle>Listen to the LYME Navy Podcast to discover how industry and Government partners are enabling mission success!</itunes:subtitle>
      <itunes:keywords>blanket purchase agreement, dell technologies ai, it infrastructure modernization, federal it modernization, navy technology, federal it solutions, infrastructure modernization solutions, lyme computer systems</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>275</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a2e40d36-1ce4-482e-bf92-2d35bb1cf978</guid>
      <title>Boosting Federal Efficiency with QFlow&apos;s Document Management Software</title>
      <description><![CDATA[Tune in to the QFlow Systems podcast to hear IT experts discuss real-world use cases, such as integrating the QAction platform with Microsoft Teams and how workflow automation solutions streamline service delivery and compliance. Listen now and discover how your organization can improve data storage strategies, grant approvals and document management processes.  
]]></description>
      <pubDate>Wed, 3 Sep 2025 13:23:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (QFlow Systems, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/boosting-federal-efficiency-with-qflows-document-management-software-2raPyN_B</link>
      <enclosure length="26450413" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/cd339882-03c6-479e-84bc-06d27976fe84/audio/23ff15fc-292d-40ab-9e6a-7943e0d05589/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Boosting Federal Efficiency with QFlow&apos;s Document Management Software</itunes:title>
      <itunes:author>QFlow Systems, Carahsoft</itunes:author>
      <itunes:duration>00:27:32</itunes:duration>
      <itunes:summary>Tune in to the QFlow Systems podcast to hear IT experts discuss real-world use cases, such as integrating the QAction platform with Microsoft Teams and how workflow automation solutions streamline service delivery and compliance. Listen now and discover how your organization can improve data storage strategies, grant approvals and document management processes. </itunes:summary>
      <itunes:subtitle>Tune in to the QFlow Systems podcast to hear IT experts discuss real-world use cases, such as integrating the QAction platform with Microsoft Teams and how workflow automation solutions streamline service delivery and compliance. Listen now and discover how your organization can improve data storage strategies, grant approvals and document management processes. </itunes:subtitle>
      <itunes:keywords>teams integration, ai document management system, document workflow automation platform, staff shortage, grant approvals, microsoft teams, document storage system, document processing, enterprise content management software system, qflow systems, automation, automated document management, automate workflows, document automation process, document management and workflow automation, ai powered workflow, qaction, microsoft teams integration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>274</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">88227429-1697-4e29-867b-d1d8ac859bfc</guid>
      <title>Modernize with Advanced Services</title>
      <description><![CDATA[In this episode, we dive into the advanced services of VMware Cloud Foundation (VCF) and explore how they empower organizations to get the most out of their cloud environments. Adam joins us to break down how solutions like vDefend, Private AI Foundation, Avi Load Balancer, and Live Recovery work seamlessly with VCF to strengthen security, enable GenAI adoption, modernize load balancing, and provide peace of mind against ransomware. We’ll also discuss which features users are adopting most, real-world examples of how they’re elevating IT environments, and why these capabilities are critical for today’s organizations. 
]]></description>
      <pubDate>Thu, 28 Aug 2025 14:48:13 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernize-with-advanced-services-_pNxfKgR</link>
      <enclosure length="10757895" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/28eb2706-5ae7-4674-87c1-243d9e34303a/audio/c24f0d43-eb44-4b9e-8f01-706d250cd23b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernize with Advanced Services</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:11:11</itunes:duration>
      <itunes:summary>In this episode, we dive into the advanced services of VMware Cloud Foundation (VCF) and explore how they empower organizations to get the most out of their cloud environments. Adam joins us to break down how solutions like vDefend, Private AI Foundation, Avi Load Balancer, and Live Recovery work seamlessly with VCF to strengthen security, enable GenAI adoption, modernize load balancing, and provide peace of mind against ransomware. We’ll also discuss which features users are adopting most, real-world examples of how they’re elevating IT environments, and why these capabilities are critical for today’s organizations.</itunes:summary>
      <itunes:subtitle>In this episode, we dive into the advanced services of VMware Cloud Foundation (VCF) and explore how they empower organizations to get the most out of their cloud environments. Adam joins us to break down how solutions like vDefend, Private AI Foundation, Avi Load Balancer, and Live Recovery work seamlessly with VCF to strengthen security, enable GenAI adoption, modernize load balancing, and provide peace of mind against ransomware. We’ll also discuss which features users are adopting most, real-world examples of how they’re elevating IT environments, and why these capabilities are critical for today’s organizations.</itunes:subtitle>
      <itunes:keywords>vmware by broadcom, secure, vmware cloud foundation, vmware renewals, vmware licensing changes, scalable it with vmware cloud foundation, broadcom advantage partner program vmware, simplifying multi-cloud with vmware cloud foundation, the value of vmware cloud foundation in renewals, cloud computing operating model, future-proof it with vmware cloud foundation, cloud infrastructure security, business continuity with vmware cloud foundation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>273</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">64b8d6b4-ace3-4d1f-85d0-f5a9b36b887a</guid>
      <title>Improving Database Management Across MultiCloud Environments</title>
      <description><![CDATA[Access the Verge Technologies podcast to hear IT experts discuss how SentientDB, Verge’s AI-powered cloud convergence platform, unifies Federal information systems at scale. Learn how organizations are leveraging automated cloud management systems to enhance database mobility, reliability and compliance. 
]]></description>
      <pubDate>Tue, 19 Aug 2025 16:15:41 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Verge Technologies)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/improving-database-management-across-multicloud-environments-FjlTfyok</link>
      <enclosure length="44042951" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ec1ac9a1-8300-43d4-9381-621edbcbc1ec/audio/6e964de2-1d96-4b2e-a3ac-63fa676794ae/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Improving Database Management Across MultiCloud Environments</itunes:title>
      <itunes:author>Carahsoft, Verge Technologies</itunes:author>
      <itunes:duration>00:45:51</itunes:duration>
      <itunes:summary>Access the Verge Technologies podcast to hear IT experts discuss how SentientDB, Verge’s AI-powered cloud convergence platform, unifies Federal information systems at scale. Learn how organizations are leveraging automated cloud management systems to enhance database mobility, reliability and compliance.</itunes:summary>
      <itunes:subtitle>Access the Verge Technologies podcast to hear IT experts discuss how SentientDB, Verge’s AI-powered cloud convergence platform, unifies Federal information systems at scale. Learn how organizations are leveraging automated cloud management systems to enhance database mobility, reliability and compliance.</itunes:subtitle>
      <itunes:keywords>self-managing database environments, sentientdb solution, verge technologies, ai database management, database migration tools, database performance optimization, managing multiple clouds, multi cloud management platform, cloud convergence management, cloud network convergence, database automation software, self-managed database, database management, database migration with zero downtime</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>272</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f7cb445-4f0b-4781-842b-b8249a2da601</guid>
      <title>Collaborate. Innovate. Deliver: A Deep Dive into the JTEK–Carahsoft Alliance</title>
      <description><![CDATA[Discover how your organization can leverage cutting-edge technology solutions to transform IT & enhance collaboration. Access the JTEK Data Solutions podcast. 
]]></description>
      <pubDate>Tue, 12 Aug 2025 13:24:35 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (JTEK Data Solutions, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/collaborate-innovate-deliver-a-deep-dive-into-the-jtekcarahsoft-alliance-n1aQ1ie1</link>
      <enclosure length="43138536" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b118b05b-f974-440a-bb5a-f371cd5047e7/audio/7a75369f-bcab-463a-be0e-584fad183f34/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Collaborate. Innovate. Deliver: A Deep Dive into the JTEK–Carahsoft Alliance</itunes:title>
      <itunes:author>JTEK Data Solutions, Carahsoft</itunes:author>
      <itunes:duration>00:44:42</itunes:duration>
      <itunes:summary>Discover how your organization can leverage cutting-edge technology solutions to transform IT &amp; enhance collaboration. Access the JTEK Data Solutions podcast.</itunes:summary>
      <itunes:subtitle>Discover how your organization can leverage cutting-edge technology solutions to transform IT &amp; enhance collaboration. Access the JTEK Data Solutions podcast.</itunes:subtitle>
      <itunes:keywords>cutting-edge, channel, software, cloud, jtek data solutions, cross agency collaboration, federal digital transformation, data, it infrastructure management services, federal, small businesses, digital transformation podcast, digital transformation strategic plan, collaboration, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>271</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">97e10c5a-99c1-42a1-8987-ce85d7bdd016</guid>
      <title>Optimize Data Pipelines, Security and Performance with Splunk AI</title>
      <description><![CDATA[Access the podcast to hear Splunk experts discuss how bitsIO’s datasensAI technology visualizes performance metrics and highlights opportunities to simplify infrastructure complexity while maintaining compliance. Discover how advanced AI/ML predictive analytics showcase unrealized value by streamlining data routing, archiving and usage workflows in the Public and Private Sectors. 
]]></description>
      <pubDate>Tue, 22 Jul 2025 16:24:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Splunk, bitsIO, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/optimize-data-pipelines-security-and-performance-with-splunk-ai-kb1zuRAb</link>
      <enclosure length="20621384" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8a03e02b-ffa1-43a8-990b-8165a0a278a5/audio/a347a6c6-2e17-4332-a683-2ab9df40ad4f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Optimize Data Pipelines, Security and Performance with Splunk AI</itunes:title>
      <itunes:author>Splunk, bitsIO, Carahsoft</itunes:author>
      <itunes:duration>00:21:18</itunes:duration>
      <itunes:summary>Access the podcast to hear Splunk experts discuss how bitsIO’s datasensAI technology visualizes performance metrics and highlights opportunities to simplify infrastructure complexity while maintaining compliance. Discover how advanced AI/ML predictive analytics showcase unrealized value by streamlining data routing, archiving and usage workflows in the Public and Private Sectors.</itunes:summary>
      <itunes:subtitle>Access the podcast to hear Splunk experts discuss how bitsIO’s datasensAI technology visualizes performance metrics and highlights opportunities to simplify infrastructure complexity while maintaining compliance. Discover how advanced AI/ML predictive analytics showcase unrealized value by streamlining data routing, archiving and usage workflows in the Public and Private Sectors.</itunes:subtitle>
      <itunes:keywords>ai-powered observability, datasensai for splunk, machine learning predictive analytics, bitsio, data visualization services, archive data storage solutions, data center investment, real-time data intelligence, data storage strategy, data pipeline optimization, increase splunk roi, splunk ai, splunk data analytics, ai data storage</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>270</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb5c0336-1298-4ad2-b067-432fe7df2f08</guid>
      <title>Unlocking Performance The Future of Data Centers in the Public Sector with Equinix</title>
      <description><![CDATA[In this episode, we explore the world of high-performance data centers and the transformative partnerships reshaping the public sector landscape. Join us as we explore how strategic collaborations between Equinix and Carahsoft can enhance operational efficiency, reduce latency, and drive innovation. Our expert guests will share insights on the critical role of data center infrastructure in ensuring optimal performance and security for public sector organizations. 
]]></description>
      <pubDate>Wed, 16 Jul 2025 19:49:22 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unlocking-performance-the-future-of-data-centers-in-the-public-sector-with-equinix-CPth14tX</link>
      <enclosure length="12331269" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ab52332a-a997-4640-9646-9b93d553c8a9/audio/03b7ca42-c014-42f3-b40e-2d878340e95b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unlocking Performance The Future of Data Centers in the Public Sector with Equinix</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:12:50</itunes:duration>
      <itunes:summary>In this episode, we explore the world of high-performance data centers and the transformative partnerships reshaping the public sector landscape. Join us as we explore how strategic collaborations between Equinix and Carahsoft can enhance operational efficiency, reduce latency, and drive innovation. Our expert guests will share insights on the critical role of data center infrastructure in ensuring optimal performance and security for public sector organizations.</itunes:summary>
      <itunes:subtitle>In this episode, we explore the world of high-performance data centers and the transformative partnerships reshaping the public sector landscape. Join us as we explore how strategic collaborations between Equinix and Carahsoft can enhance operational efficiency, reduce latency, and drive innovation. Our expert guests will share insights on the critical role of data center infrastructure in ensuring optimal performance and security for public sector organizations.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>269</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ae5dc24-3bfc-4e31-8269-79b0f2867793</guid>
      <title>A New Era in Public Sector Data Intelligence</title>
      <description><![CDATA[In this podcast with Sujit Mohanty, General Manager of Field Engineering at Databricks, learn how the recent achievement of FedRAMP high for Databricks on AWS creates impactful opportunities for modernization within the Federal Government 
]]></description>
      <pubDate>Tue, 27 May 2025 20:04:10 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/a-new-era-in-public-sector-data-intelligence-rev6sJTZ</link>
      <enclosure length="15321820" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7b45a6b7-8dbe-4efa-94b9-9f4d0ad27bfd/audio/09bb5ab8-30f1-48af-a8d5-52e53c632685/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A New Era in Public Sector Data Intelligence</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:15:57</itunes:duration>
      <itunes:summary>In this podcast with Sujit Mohanty, General Manager of Field Engineering at Databricks, learn how the recent achievement of FedRAMP high for Databricks on AWS creates impactful opportunities for modernization within the Federal Government</itunes:summary>
      <itunes:subtitle>In this podcast with Sujit Mohanty, General Manager of Field Engineering at Databricks, learn how the recent achievement of FedRAMP high for Databricks on AWS creates impactful opportunities for modernization within the Federal Government</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>268</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec8805b0-b801-4be6-8d10-9e26ee09afc7</guid>
      <title>A New Era of Efficiency: Leveraging AI, Data, and Modernization to Improve Public Services</title>
      <description><![CDATA[Access the podcast to hear Greg Reeder, Senior Director of Public Sector Marketing at Datadog, and Martha Dorris, Founder of DCI Consulting, discuss how agencies increase agility and efficiency with innovative customer experience strategies, digital transformation and proactive application monitoring tools. Listen to practical use cases from the State Department, IRS and CBP showcasing how human-centric design increases engagement and public trust.

Dive deeper into related resources like Datadog’s CX eBook, explore solutions tailored for public agencies at datadog.com/gov, and follow The CX Tipping Point® Podcast for ongoing insights into how private-sector CX practices are transforming government service delivery.

 
]]></description>
      <pubDate>Wed, 14 May 2025 19:50:03 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Datadog, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/datadog-enhances-public-services-with-it-observability-and-ai-driven-analytics-j9jPIJHv</link>
      <enclosure length="20599975" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/410a5909-0bac-4d48-b1a7-4009e2eb4740/audio/31843634-0100-457d-bdcb-5bc4ccf307fd/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A New Era of Efficiency: Leveraging AI, Data, and Modernization to Improve Public Services</itunes:title>
      <itunes:author>Datadog, Carahsoft</itunes:author>
      <itunes:duration>00:21:14</itunes:duration>
      <itunes:summary>Access the podcast to hear Greg Reeder, Senior Director of Public Sector Marketing at Datadog, and Martha Dorris, Founder of DCI Consulting, discuss how agencies increase agility and efficiency with innovative customer experience strategies, digital transformation and proactive application monitoring tools. Listen to practical use cases from the State Department, IRS and CBP showcasing how human-centric design increases engagement and public trust.

Dive deeper into related resources like Datadog’s CX eBook, explore solutions tailored for public agencies at datadog.com/gov, and follow The CX Tipping Point® Podcast for ongoing insights into how private-sector CX practices are transforming government service delivery.

</itunes:summary>
      <itunes:subtitle>Access the podcast to hear Greg Reeder, Senior Director of Public Sector Marketing at Datadog, and Martha Dorris, Founder of DCI Consulting, discuss how agencies increase agility and efficiency with innovative customer experience strategies, digital transformation and proactive application monitoring tools. Listen to practical use cases from the State Department, IRS and CBP showcasing how human-centric design increases engagement and public trust.

Dive deeper into related resources like Datadog’s CX eBook, explore solutions tailored for public agencies at datadog.com/gov, and follow The CX Tipping Point® Podcast for ongoing insights into how private-sector CX practices are transforming government service delivery.

</itunes:subtitle>
      <itunes:keywords>machine learning, software, network, modernization, digital customer experience, it, cybersecurity, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>267</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb57b46b-157b-45c6-92c7-2537f0801d3a</guid>
      <title>How the City of Linden Maximizes Efficiency with Google Workspace</title>
      <description><![CDATA[Listen to the smart governance podcast to hear industry experts discuss how the City of Linden leverages Google Workspace to digitally transform essential State and Local Government workflows. Explore how Google Workspace’s cloud-based productivity suite empowers agencies to improve organizational efficiency and protect sensitive data with advanced threat detection. 
]]></description>
      <pubDate>Fri, 25 Apr 2025 18:29:32 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Google Workspace, TeliApp, Onix, Carahsoft, Google)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-the-city-of-linden-maximizes-efficiency-with-google-workspace-CbT3MPwI</link>
      <enclosure length="21138294" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b185a15f-0916-4946-8d41-96b9c1287715/audio/8e7f590e-c80a-4254-9519-517ce8596869/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How the City of Linden Maximizes Efficiency with Google Workspace</itunes:title>
      <itunes:author>Google Workspace, TeliApp, Onix, Carahsoft, Google</itunes:author>
      <itunes:duration>00:22:00</itunes:duration>
      <itunes:summary>Listen to the smart governance podcast to hear industry experts discuss how the City of Linden leverages Google Workspace to digitally transform essential State and Local Government workflows. Explore how Google Workspace’s cloud-based productivity suite empowers agencies to improve organizational efficiency and protect sensitive data with advanced threat detection.</itunes:summary>
      <itunes:subtitle>Listen to the smart governance podcast to hear industry experts discuss how the City of Linden leverages Google Workspace to digitally transform essential State and Local Government workflows. Explore how Google Workspace’s cloud-based productivity suite empowers agencies to improve organizational efficiency and protect sensitive data with advanced threat detection.</itunes:subtitle>
      <itunes:keywords>ai/machine learning, it modernization, remote work tools, cybersecurity tools, cost-saving it, productivity software, education, data security, cloud computing government technology, workplace collaboration, cloud solutions, cybersecurity, digital transformation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>266</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5302f99d-ebe5-4574-a862-0e874e580b0a</guid>
      <title>Why VMware Cloud Foundation</title>
      <description><![CDATA[ Discover how Public Sector organizations leverage VMware by Broadcom to unify & secure cloud infrastructure at scale. Listen to the VMware renewals podcast now.  
]]></description>
      <pubDate>Fri, 11 Apr 2025 13:44:33 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware by Broadcom, Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/why-vmware-cloud-foundation-ZF7zakBt</link>
      <enclosure length="14083716" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d09ac6f5-d9f5-4cd6-b24f-465918de1b0e/audio/ac651663-b691-4c48-8bb5-070f0220fdc5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Why VMware Cloud Foundation</itunes:title>
      <itunes:author>VMware by Broadcom, Carahsoft, VMware</itunes:author>
      <itunes:duration>00:14:39</itunes:duration>
      <itunes:summary> Discover how Public Sector organizations leverage VMware by Broadcom to unify &amp; secure cloud infrastructure at scale. Listen to the VMware renewals podcast now. </itunes:summary>
      <itunes:subtitle> Discover how Public Sector organizations leverage VMware by Broadcom to unify &amp; secure cloud infrastructure at scale. Listen to the VMware renewals podcast now. </itunes:subtitle>
      <itunes:keywords>cost optimization, infrastructure modernization, cloud, digital library, licensing transition, vmware cloud foundation, cloud computing, data center, broadcom, artificial intelligence, application modernization, hybrid cloud, automation, private cloud, operational excellence, security policies, subscription model, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>265</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">60f78540-23e0-4db7-b2ba-d8db17b5a676</guid>
      <title>Atlassian Supercharges Government Collaboration with Loom Video Messaging</title>
      <description><![CDATA[Listen to the Atlassian’s Loom podcast to hear Arjuna Rivera, Senior Solutions Engineer at Atlassian discuss the advantages of streamlining communication with functional and customizable video messages. Explore how Loom can enable you to record key information via camera, microphone and desktop screen, then quickly edit and share it across your organization.  
]]></description>
      <pubDate>Mon, 24 Feb 2025 14:06:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/atlassian-supercharges-government-collaboration-with-loom-video-messaging-_u_grS_n</link>
      <enclosure length="13813153" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/29de8698-30bf-47f5-8971-a9ebdfdaaf5c/audio/f3bcd201-319a-4e48-81da-ce76a1946ad7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Atlassian Supercharges Government Collaboration with Loom Video Messaging</itunes:title>
      <itunes:author>Carahsoft, Atlassian</itunes:author>
      <itunes:duration>00:14:13</itunes:duration>
      <itunes:summary>Listen to the Atlassian’s Loom podcast to hear Arjuna Rivera, Senior Solutions Engineer at Atlassian discuss the advantages of streamlining communication with functional and customizable video messages. Explore how Loom can enable you to record key information via camera, microphone and desktop screen, then quickly edit and share it across your organization. </itunes:summary>
      <itunes:subtitle>Listen to the Atlassian’s Loom podcast to hear Arjuna Rivera, Senior Solutions Engineer at Atlassian discuss the advantages of streamlining communication with functional and customizable video messages. Explore how Loom can enable you to record key information via camera, microphone and desktop screen, then quickly edit and share it across your organization. </itunes:subtitle>
      <itunes:keywords>atlassian, screen recording, team communication, asynchronous communication, productivity tools, loom, user experience, work efficiency, jira, confluence, integration, video messaging, ai transcription, collaboration, collaborative software, customization</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>264</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">31ebfb19-fd2b-4336-8eff-5ead3a14f20f</guid>
      <title>Next Gen Judical Efficiency with Docusign and Salesforce</title>
      <description><![CDATA[Tune in to the Docusign Law Enforcement & Public Safety podcast series and discover how agencies deliver timely justice by leveraging a secure digital document management system. Explore how the Docusign platform modernizes e-signature, eWarrant and subpoena processes to protect your organization’s sensitive information and optimize document workflows. 
]]></description>
      <pubDate>Fri, 31 Jan 2025 20:14:31 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Salesforce, Docusign, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/next-gen-judical-efficiency-with-docusign-and-salesforce-BHjtssH_</link>
      <enclosure length="13637414" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f859f8b6-6297-40f2-b521-a7cb3496fc56/audio/f2e12194-b048-4b7f-9687-cc1b57ddcbe7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Next Gen Judical Efficiency with Docusign and Salesforce</itunes:title>
      <itunes:author>Salesforce, Docusign, Carahsoft</itunes:author>
      <itunes:duration>00:14:11</itunes:duration>
      <itunes:summary>Tune in to the Docusign Law Enforcement &amp; Public Safety podcast series and discover how agencies deliver timely justice by leveraging a secure digital document management system. Explore how the Docusign platform modernizes e-signature, eWarrant and subpoena processes to protect your organization’s sensitive information and optimize document workflows.</itunes:summary>
      <itunes:subtitle>Tune in to the Docusign Law Enforcement &amp; Public Safety podcast series and discover how agencies deliver timely justice by leveraging a secure digital document management system. Explore how the Docusign platform modernizes e-signature, eWarrant and subpoena processes to protect your organization’s sensitive information and optimize document workflows.</itunes:subtitle>
      <itunes:keywords>electronic warrants, time savings, digital document management system, efficiency improvements, document approval process, docusign platform, enhanced safety, digital warrants, reduced errors, process streamlining, e-signing software, digital document workflow, technical limitations, criminal investigation process, user experience, legal concerns, law enforcement documents, digital document signing, online document signing, docusign solution, docusign digital signature, law enforcement case management, stakeholder collaboration, electronic signature software, community trust, law enforcement, docusign signature, compliance benefits, digital evidence management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>263</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">21d0f508-47c4-4434-86f1-13814e8cf37e</guid>
      <title>Serving Smarter with Docusign The Digital Warrant Process From Start to Finish</title>
      <description><![CDATA[Tune in to the Docusign Law Enforcement & Public Safety podcast series and discover how agencies deliver timely justice by leveraging a secure digital document management system. Explore how the Docusign platform modernizes e-signature, eWarrant and subpoena processes to protect your organization’s sensitive information and optimize document workflows. 
]]></description>
      <pubDate>Fri, 31 Jan 2025 20:08:05 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Docusign, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/serving-smarter-with-docusign-the-digital-warrant-process-from-start-to-finish-SOPjgS4l</link>
      <enclosure length="32653900" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/a062e1da-bdf6-4c82-be62-9ea94d3f2c4c/audio/0ea8bc25-fe4a-4fb7-8a43-2d36b0488f64/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Serving Smarter with Docusign The Digital Warrant Process From Start to Finish</itunes:title>
      <itunes:author>Docusign, Carahsoft</itunes:author>
      <itunes:duration>00:33:59</itunes:duration>
      <itunes:summary>Tune in to the Docusign Law Enforcement &amp; Public Safety podcast series and discover how agencies deliver timely justice by leveraging a secure digital document management system. Explore how the Docusign platform modernizes e-signature, eWarrant and subpoena processes to protect your organization’s sensitive information and optimize document workflows.</itunes:summary>
      <itunes:subtitle>Tune in to the Docusign Law Enforcement &amp; Public Safety podcast series and discover how agencies deliver timely justice by leveraging a secure digital document management system. Explore how the Docusign platform modernizes e-signature, eWarrant and subpoena processes to protect your organization’s sensitive information and optimize document workflows.</itunes:subtitle>
      <itunes:keywords>electronic warrants, time savings, digital document management system, efficiency improvements, document approval process, docusign platform, enhanced safety, digital warrants, reduced errors, process streamlining, e-signing software, digital document workflow, technical limitations, criminal investigation process, user experience, legal concerns, law enforcement documents, digital document signing, online document signing, docusign solution, docusign digital signature, law enforcement case management, stakeholder collaboration, electronic signature software, community trust, law enforcement, docusign signature, compliance benefits, digital evidence management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>262</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">af6a1b9f-3ae4-42e5-b110-ff469a2b279d</guid>
      <title>Entrust Podcast: Ensuring CJIS Compliance with IAM Solutions</title>
      <description><![CDATA[Explore how Government agencies leverage Entrust's identity & access management platform to meet CJIS compliance requirements. Protect your sensitive data now. 
]]></description>
      <pubDate>Thu, 9 Jan 2025 14:46:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/entrust-podcast-ensuring-cjis-compliance-with-iam-solutions-WhWw_dLE</link>
      <enclosure length="41383104" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/827f8fa1-45ec-4656-9a67-35bf5fa136fb/audio/ad1d90ce-7d02-4f62-b48b-540ab858b18b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Entrust Podcast: Ensuring CJIS Compliance with IAM Solutions</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:43:06</itunes:duration>
      <itunes:summary>Explore how Government agencies leverage Entrust&apos;s identity &amp; access management platform to meet CJIS compliance requirements. Protect your sensitive data now.</itunes:summary>
      <itunes:subtitle>Explore how Government agencies leverage Entrust&apos;s identity &amp; access management platform to meet CJIS compliance requirements. Protect your sensitive data now.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>261</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">296358b2-9d88-41ee-9674-abcfc41f0f61</guid>
      <title>Strengthening Federal Supply Chain Integrity with Intel</title>
      <description><![CDATA[Unlock the Intel podcast to hear cybersecurity experts discuss the importance of supply chain security and solution acquisition strategies for safeguarding IT environments. Discover how your Federal Government agency can mitigate risk for end users while maintaining compliant and efficient operations.  
]]></description>
      <pubDate>Wed, 18 Dec 2024 14:42:28 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Intel, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/strengthening-federal-supply-chain-integrity-with-intel-j3vRdNBR</link>
      <enclosure length="22376132" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c5a3baba-1326-4dfc-a63d-46c9dcb98551/audio/264e4737-128b-415a-8991-84e12d4fdd77/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Strengthening Federal Supply Chain Integrity with Intel</itunes:title>
      <itunes:author>Intel, Carahsoft</itunes:author>
      <itunes:duration>00:23:16</itunes:duration>
      <itunes:summary>Unlock the Intel podcast to hear cybersecurity experts discuss the importance of supply chain security and solution acquisition strategies for safeguarding IT environments. Discover how your Federal Government agency can mitigate risk for end users while maintaining compliant and efficient operations. </itunes:summary>
      <itunes:subtitle>Unlock the Intel podcast to hear cybersecurity experts discuss the importance of supply chain security and solution acquisition strategies for safeguarding IT environments. Discover how your Federal Government agency can mitigate risk for end users while maintaining compliant and efficient operations. </itunes:subtitle>
      <itunes:keywords>hardware security, intel security podcast, supply chain security, risk management, device management, cyber threat, cyber attack, supply chain security for it solutions, it infrastructure, it, entrusted it systems, supply chain management, supply chain, intel webinar, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>261</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8a8a717c-f84b-4d60-a120-09ac4a7ec5ab</guid>
      <title>Automate Database Asset Management in the Cloud with Verge Technologies</title>
      <description><![CDATA[Tune into the Verge Technologies podcast to hear data experts discuss how SentientDB, an AI-powered database management solution, ensures performance, reliability and mobility in multicloud and hybrid environments. Enable your Government agency to prioritize data management, security and team development with innovative cloud convergence services. 
]]></description>
      <pubDate>Fri, 20 Sep 2024 14:36:37 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Verge Technologies, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/automate-database-asset-management-in-the-cloud-with-verge-technologies-liyCBj_O</link>
      <enclosure length="19643979" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e6e6c7be-4bc9-4f3a-963b-16a14e12cdfd/audio/e5911d53-6013-4507-822d-2e2dce47decc/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Automate Database Asset Management in the Cloud with Verge Technologies</itunes:title>
      <itunes:author>Verge Technologies, Carahsoft</itunes:author>
      <itunes:duration>00:20:26</itunes:duration>
      <itunes:summary>Tune into the Verge Technologies podcast to hear data experts discuss how SentientDB, an AI-powered database management solution, ensures performance, reliability and mobility in multicloud and hybrid environments. Enable your Government agency to prioritize data management, security and team development with innovative cloud convergence services.</itunes:summary>
      <itunes:subtitle>Tune into the Verge Technologies podcast to hear data experts discuss how SentientDB, an AI-powered database management solution, ensures performance, reliability and mobility in multicloud and hybrid environments. Enable your Government agency to prioritize data management, security and team development with innovative cloud convergence services.</itunes:subtitle>
      <itunes:keywords>it modernization services for government institutions, self-managing database environments, cloud convergence, database migration service, verge technologies, automated database system, cyber attack, cyberthreat, technology, database asset management, managing multiple clouds, cyber, cloud migration service provider, cloud convergence management, data security, it, unified data platform architecture, cloud-based solutions for secure government operations, automated database management, data performance optimization for government, automated infrastructure management, self-managed database, cloud management platforms, cybersecurity, database management, database migration with zero downtime</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>260</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5e021ab3-5d8d-4aca-b687-447ef711ad2a</guid>
      <title>Staying Ahead in the Evolving Landscape of CJIS Compliance</title>
      <description><![CDATA[Podcast description: Join us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Gain insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. Discover how these solutions streamline operations, improve data security, and contribute to CJIS compliance. 
]]></description>
      <pubDate>Tue, 10 Sep 2024 15:30:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/staying-ahead-in-the-evolving-landscape-of-cjis-compliance-vIf6E_6t</link>
      <enclosure length="52275601" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f5eb46a5-164c-49d7-9b7c-110ccdec08df/audio/055b54ba-ae59-4303-bf5d-a6ddb8827cb5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Staying Ahead in the Evolving Landscape of CJIS Compliance</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:54:26</itunes:duration>
      <itunes:summary>Podcast description: Join us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Gain insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. Discover how these solutions streamline operations, improve data security, and contribute to CJIS compliance.</itunes:summary>
      <itunes:subtitle>Podcast description: Join us for a webinar designed to help government agencies navigate CJIS compliance and explore the latest security measures. Gain insights from real-world case studies, including the City of Garland and the City of Northport, showcasing the practical implementation of TecMFA and Tectango for Police. Discover how these solutions streamline operations, improve data security, and contribute to CJIS compliance.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>259</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c9ea836e-cd67-4505-919e-c43b4ab485ab</guid>
      <title>Safeguarding Public Sector Data with Trusona Passkey Authentication</title>
      <description><![CDATA[Listen to the Trusona passkey authentication podcast to learn from cybersecurity experts as they discuss robust phishing defense tactics and passwordless authentication solutions. Explore how your organization can leverage advanced password security software to enhance sign-in processes, effectively mitigating the evolving risks of GenAI by detecting impersonation fraud and account takeover attacks early.  
]]></description>
      <pubDate>Mon, 9 Sep 2024 16:57:47 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Trusona, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/safeguarding-public-sector-data-with-trusona-passkey-authentication-d6Ep6Oab</link>
      <enclosure length="21268463" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f9a0f272-3b04-4a25-bfbc-201836b82f72/audio/e1219b60-d216-47cc-9abe-a7339e3838a5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Safeguarding Public Sector Data with Trusona Passkey Authentication</itunes:title>
      <itunes:author>Trusona, Carahsoft</itunes:author>
      <itunes:duration>00:22:08</itunes:duration>
      <itunes:summary>Listen to the Trusona passkey authentication podcast to learn from cybersecurity experts as they discuss robust phishing defense tactics and passwordless authentication solutions. Explore how your organization can leverage advanced password security software to enhance sign-in processes, effectively mitigating the evolving risks of GenAI by detecting impersonation fraud and account takeover attacks early. </itunes:summary>
      <itunes:subtitle>Listen to the Trusona passkey authentication podcast to learn from cybersecurity experts as they discuss robust phishing defense tactics and passwordless authentication solutions. Explore how your organization can leverage advanced password security software to enhance sign-in processes, effectively mitigating the evolving risks of GenAI by detecting impersonation fraud and account takeover attacks early. </itunes:subtitle>
      <itunes:keywords>bad, private key crypotography, users, keys, breach, frank, account, create, randomware, genai, call center, cyber threat, cyber attack, journey, fraud, ato, technology, passwords, login, phishing, simply, password protection, pass, cyber, means, authenticated, government agency, passkey authentication, passkey, password less authentication solutions, account takeover, genai fraud, social engineering, cybersecurity, account takeover attacks, people, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>258</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e61528a4-8170-4958-8411-d7a194fd1ce0</guid>
      <title>AI Enhanced Inspections &amp; Work Order Automation</title>
      <description><![CDATA[Listen to the MB&A and Plauti podcast to hear from industry experts as they discuss real-world use cases. Discover how MB&A seamlessly integrates Plauti’s AI automation capabilities within Salesforce to modernize field inspection services for agencies. Allocate and improve data consolidation to enhance productivity and ensure security compliance.  
]]></description>
      <pubDate>Tue, 25 Jun 2024 18:09:09 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ai-enhanced-inspections-work-order-automation-19_Vl3jh</link>
      <enclosure length="40519671" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4dd00eca-22f3-4899-a4dd-405db42552c2/audio/9ab7ee48-b27d-4416-8ee1-8a02c3492803/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>AI Enhanced Inspections &amp; Work Order Automation</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:42:12</itunes:duration>
      <itunes:summary>Listen to the MB&amp;A and Plauti podcast to hear from industry experts as they discuss real-world use cases. Discover how MB&amp;A seamlessly integrates Plauti’s AI automation capabilities within Salesforce to modernize field inspection services for agencies. Allocate and improve data consolidation to enhance productivity and ensure security compliance. </itunes:summary>
      <itunes:subtitle>Listen to the MB&amp;A and Plauti podcast to hear from industry experts as they discuss real-world use cases. Discover how MB&amp;A seamlessly integrates Plauti’s AI automation capabilities within Salesforce to modernize field inspection services for agencies. Allocate and improve data consolidation to enhance productivity and ensure security compliance. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>257</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ab43f7d7-55c2-49a0-839a-1336e36a72c5</guid>
      <title>Adopting Zero Trust Architecture in the Commonwealth of PA</title>
      <description><![CDATA[State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies' IT systems and technical support staff. Zero Trust has been widely adopted by agencies and organizations to secure their users, apps, Internet of Things (IoT) devices, and workloads, regardless of which networks or cloud resources they're connecting to, where they're located, or how they're connecting.

During this podcast, Zscaler and CDI will provide information on how they can help you:
- Simplify administration, improve visibility, and ensure consistent security controls and compliance across your entire agency's network.
- Leverage our robust security capabilities to allow your agency to better protect sensitive data, networks, and systems from cyber threats.
- Reduce upfront costs and ongoing maintenance expenses by consolidating security functions into a unified solution. 
]]></description>
      <pubDate>Thu, 16 May 2024 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/adopting-zero-trust-architecture-in-the-commonwealth-of-pa-yoah3XWI</link>
      <enclosure length="40296035" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/a4676083-2d0b-4a2b-93f2-b13d24d24811/audio/452e95fe-004b-49ae-b2b9-552fc9ee7cda/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Adopting Zero Trust Architecture in the Commonwealth of PA</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:41:58</itunes:duration>
      <itunes:summary>State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies&apos; IT systems and technical support staff. Zero Trust has been widely adopted by agencies and organizations to secure their users, apps, Internet of Things (IoT) devices, and workloads, regardless of which networks or cloud resources they&apos;re connecting to, where they&apos;re located, or how they&apos;re connecting.

During this podcast, Zscaler and CDI will provide information on how they can help you:
- Simplify administration, improve visibility, and ensure consistent security controls and compliance across your entire agency&apos;s network.
- Leverage our robust security capabilities to allow your agency to better protect sensitive data, networks, and systems from cyber threats.
- Reduce upfront costs and ongoing maintenance expenses by consolidating security functions into a unified solution.</itunes:summary>
      <itunes:subtitle>State and local governments had to adapt quickly to the effects of the pandemic, as workers and residents alike were encouraged to shelter in their homes. This created major challenges for agencies&apos; IT systems and technical support staff. Zero Trust has been widely adopted by agencies and organizations to secure their users, apps, Internet of Things (IoT) devices, and workloads, regardless of which networks or cloud resources they&apos;re connecting to, where they&apos;re located, or how they&apos;re connecting.

During this podcast, Zscaler and CDI will provide information on how they can help you:
- Simplify administration, improve visibility, and ensure consistent security controls and compliance across your entire agency&apos;s network.
- Leverage our robust security capabilities to allow your agency to better protect sensitive data, networks, and systems from cyber threats.
- Reduce upfront costs and ongoing maintenance expenses by consolidating security functions into a unified solution.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>256</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3cf25fdc-39b2-43dd-bbe3-7c9ed706202b</guid>
      <title>Ingentis Optimizes HR Management with Ready-to-Run Extensions</title>
      <description><![CDATA[Listen to the org.manager podcast to hear John Kranz, Workforce Management and Optimization Consultant at Ingentis, discuss best practices for streamlining organizational structure charts, HR management systems and data visualization processes. Learn how your Public Sector agency can deliver visual workforce data with ready-to-run extensions.  
]]></description>
      <pubDate>Mon, 13 May 2024 19:08:09 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Ingentis)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ingentis-optimizes-hr-management-with-ready-to-run-extensions-_DJQAFI8</link>
      <enclosure length="14365306" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/dce65984-bbc7-4b1f-92fe-8c7a41db7bd0/audio/4815384c-1db8-4a99-be8c-a07144532f18/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ingentis Optimizes HR Management with Ready-to-Run Extensions</itunes:title>
      <itunes:author>Carahsoft, Ingentis</itunes:author>
      <itunes:duration>00:14:56</itunes:duration>
      <itunes:summary>Listen to the org.manager podcast to hear John Kranz, Workforce Management and Optimization Consultant at Ingentis, discuss best practices for streamlining organizational structure charts, HR management systems and data visualization processes. Learn how your Public Sector agency can deliver visual workforce data with ready-to-run extensions. </itunes:summary>
      <itunes:subtitle>Listen to the org.manager podcast to hear John Kranz, Workforce Management and Optimization Consultant at Ingentis, discuss best practices for streamlining organizational structure charts, HR management systems and data visualization processes. Learn how your Public Sector agency can deliver visual workforce data with ready-to-run extensions. </itunes:subtitle>
      <itunes:keywords>aging workforce, organization, organizational development solutions, solution, ingentis org.managent, options, reports, hr management, manager, provide, positions, pre configured solutions, benefit, human resources and organizational development teams, workforce modeling reports, based, extensions, equity and inclusion, visualizations, org charts, headcount, hr, open headcount management, data, talk, hr management platform, org, hr data visualization, multiple data sources, diversity, human resources, best business practices, org chart software, organizational development team, unified data platform</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>255</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10f131d5-5fab-4348-a157-bc70a71d8930</guid>
      <title>Lattes &amp; Learning: Transforming Public Sector Networking Systems</title>
      <description><![CDATA[Listen to the Juniper Networks podcast to hear from data center experts discuss the benefits of AI-native networking and how leveraging Juniper’s Mist AI platform enhances end-user visibility and experience. Discover how the world’s first AI-driven wired and wireless network optimizes Public Sector workflows and data center systems. 
]]></description>
      <pubDate>Thu, 9 May 2024 18:58:38 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/lattes-learning-transforming-public-sector-networking-systems-zf6jRX6f</link>
      <enclosure length="34681696" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/cba623c7-8814-4c0f-a472-e88059163eb3/audio/1c9e92ab-ec5e-495d-a24d-dc231843f847/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Lattes &amp; Learning: Transforming Public Sector Networking Systems</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:36:07</itunes:duration>
      <itunes:summary>Listen to the Juniper Networks podcast to hear from data center experts discuss the benefits of AI-native networking and how leveraging Juniper’s Mist AI platform enhances end-user visibility and experience. Discover how the world’s first AI-driven wired and wireless network optimizes Public Sector workflows and data center systems.</itunes:summary>
      <itunes:subtitle>Listen to the Juniper Networks podcast to hear from data center experts discuss the benefits of AI-native networking and how leveraging Juniper’s Mist AI platform enhances end-user visibility and experience. Discover how the world’s first AI-driven wired and wireless network optimizes Public Sector workflows and data center systems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>254</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d3f9b386-cfc4-4b07-b677-bbd86ebe1e03</guid>
      <title>Atlassian Streamlines Federal Operations with Powerful Service Management</title>
      <description><![CDATA[Tune in to the Atlassian podcast to hear Erin Philips, Director of Product Marketing, and Kirk Shultz, Atlassian Consultant at Isos Technology, discuss how Atlassian JSM reduces resolution times for citizen inquiries and internal requests. Explore how Atlassian’s simple user interface fosters collaboration, enhances service delivery, promotes transparency and complies with Federal security requirements. 
]]></description>
      <pubDate>Wed, 1 May 2024 21:01:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/atlassian-streamlines-federal-operations-with-powerful-service-management-XzMzxjTZ</link>
      <enclosure length="17582788" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/630566f9-286b-4d48-96ea-f8717c27585f/audio/5e2c893e-713a-44ec-8e73-63248587f944/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Atlassian Streamlines Federal Operations with Powerful Service Management</itunes:title>
      <itunes:author>Carahsoft, Atlassian</itunes:author>
      <itunes:duration>00:18:18</itunes:duration>
      <itunes:summary>Tune in to the Atlassian podcast to hear Erin Philips, Director of Product Marketing, and Kirk Shultz, Atlassian Consultant at Isos Technology, discuss how Atlassian JSM reduces resolution times for citizen inquiries and internal requests. Explore how Atlassian’s simple user interface fosters collaboration, enhances service delivery, promotes transparency and complies with Federal security requirements.</itunes:summary>
      <itunes:subtitle>Tune in to the Atlassian podcast to hear Erin Philips, Director of Product Marketing, and Kirk Shultz, Atlassian Consultant at Isos Technology, discuss how Atlassian JSM reduces resolution times for citizen inquiries and internal requests. Explore how Atlassian’s simple user interface fosters collaboration, enhances service delivery, promotes transparency and complies with Federal security requirements.</itunes:subtitle>
      <itunes:keywords>isos, atlassian, enablement, atlassian asset management, atlassian managed services, cloud, jsm, atlassian itsm, jira service, government, atlassian jira service management, jira service management, assets, implement, simple user interface, isos technology, atlassian change management, jira, atlassian assets, change asset control, ranked, government agencies, federal, federal agencies, shultz, kirk, spreadsheets, checklist, service delivery system, management, asset management, migrate</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>253</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0501d7e7-468c-44c6-aefe-3b20268ab753</guid>
      <title>Improving the Customer Experience</title>
      <description><![CDATA[Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida. 
]]></description>
      <pubDate>Mon, 25 Mar 2024 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/improving-the-customer-experience-zrc565lX</link>
      <enclosure length="57756354" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8f1257c1-9247-4b50-b49a-975ccc5f9a32/audio/eff2c8b6-3924-43e5-90d5-278e1a3517c4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Improving the Customer Experience</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>01:00:09</itunes:duration>
      <itunes:summary>Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.</itunes:summary>
      <itunes:subtitle>Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>250</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">311b5cc3-af13-49d9-a444-9ff44cf65375</guid>
      <title>Improving Cybersecurity in a Hyper Connected World</title>
      <description><![CDATA[Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida. 
]]></description>
      <pubDate>Mon, 25 Mar 2024 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/improving-cybersecurity-in-a-hyper-connected-world-_c3T3XXp</link>
      <enclosure length="49663412" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/aba19f0b-a49b-43fe-a096-942f9ffdd922/audio/e6dd5f98-d284-4a28-8180-9274a9d2f5c9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Improving Cybersecurity in a Hyper Connected World</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:51:43</itunes:duration>
      <itunes:summary>Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.</itunes:summary>
      <itunes:subtitle>Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>252</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3bfe6af8-95d1-4922-b2fd-63b632e745f9</guid>
      <title>Bring on the Cloud</title>
      <description><![CDATA[Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida. 
]]></description>
      <pubDate>Mon, 25 Mar 2024 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bring-on-the-cloud-6bVl3j1G</link>
      <enclosure length="48592183" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b9307d5b-d87d-4ad0-8817-7b9766ebf76b/audio/f4d39212-d051-411d-945f-d1f146f72d45/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Bring on the Cloud</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:50:36</itunes:duration>
      <itunes:summary>Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.</itunes:summary>
      <itunes:subtitle>Hear from state and local IT officials and corporate thought leaders as they discuss the steps agencies are taking to innovate their services, protect their customers and agencies, and what they are tackling first in Florida.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>251</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7e24f976-c1df-4478-9f56-da8bf3225361</guid>
      <title>Navigating the 5G Landscape: Progress and Status in US Federal Deployments</title>
      <description><![CDATA[The initial phases of 5G initiatives. Insights into progress updates, success stories, lessons learned, future strategies, and related subjects around the power of 5G.
 
]]></description>
      <pubDate>Tue, 19 Mar 2024 19:13:28 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/navigating-the-5g-landscape-progress-and-status-in-us-federal-deployments-rNUf5eKU</link>
      <enclosure length="54837214" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b1159004-07c8-404d-8950-6a17f51b7495/audio/cc60743f-865b-4aa4-a516-355e0e9888fc/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Navigating the 5G Landscape: Progress and Status in US Federal Deployments</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:57:06</itunes:duration>
      <itunes:summary>The initial phases of 5G initiatives. Insights into progress updates, success stories, lessons learned, future strategies, and related subjects around the power of 5G.
</itunes:summary>
      <itunes:subtitle>The initial phases of 5G initiatives. Insights into progress updates, success stories, lessons learned, future strategies, and related subjects around the power of 5G.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>249</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b661d11-c02b-452a-a268-fbad832af7e8</guid>
      <title>Mastering HR Visualization with SAP and Ingentis</title>
      <description><![CDATA[In this HR data visualization podcast, SAP and Ingentis digital transformation experts discuss how Ingentis org manager integrates seamlessly with SAP SuccessFactors, empowering HR departments with data-driven insights. Drive transformative change by unlocking the full potential of your HR data. 
]]></description>
      <pubDate>Fri, 8 Mar 2024 18:04:07 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Ingentis, Carahsoft, SAP)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mastering-hr-visualization-with-sap-and-ingentis-FEHQKsNg</link>
      <enclosure length="39205953" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/62e8456f-7e44-4a4a-b3ce-2df8709e69aa/audio/3f012db2-63ff-479d-b12c-74be35bde9d6/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mastering HR Visualization with SAP and Ingentis</itunes:title>
      <itunes:author>Ingentis, Carahsoft, SAP</itunes:author>
      <itunes:duration>00:40:48</itunes:duration>
      <itunes:summary>In this HR data visualization podcast, SAP and Ingentis digital transformation experts discuss how Ingentis org manager integrates seamlessly with SAP SuccessFactors, empowering HR departments with data-driven insights. Drive transformative change by unlocking the full potential of your HR data.</itunes:summary>
      <itunes:subtitle>In this HR data visualization podcast, SAP and Ingentis digital transformation experts discuss how Ingentis org manager integrates seamlessly with SAP SuccessFactors, empowering HR departments with data-driven insights. Drive transformative change by unlocking the full potential of your HR data.</itunes:subtitle>
      <itunes:keywords>organization, platform, organizational modeling, org chart, reports, human resources best practices, positions, workforce development initiatives, sap, sap success factors integrations, sap org structure, ingentis org chart, visualizations, success factors, department, today, modeling, hr, sap hr best practices, data, partner, org, public sector, hr data visualization, integration, data visualizations, human resource visualization, talent acquisition strategies, automated org chart, ingentis org manager, hr compliance guidelines, agency, work</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>248</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec79396b-e5ec-4a47-b56f-36dfda3c444d</guid>
      <title>Revolutionizing Public Sector Procurement: Harnessing the Power of DocuSign CLM and SAP Ariba</title>
      <description><![CDATA[Tune in to our podcast episode featuring DocuSign and SAP industry experts as they discuss how DocuSign CLM and SAP Ariba can streamline contract agreements, fortifying the connection between Public Sector agencies and suppliers. 
]]></description>
      <pubDate>Wed, 14 Feb 2024 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/revolutionizing-public-sector-procurement-harnessing-the-power-of-docusign-clm-and-sap-ariba-dw5cRma_</link>
      <enclosure length="30358059" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9248d005-3f15-4237-9a30-5df2f2f7869e/audio/ff3d0a24-f88b-49b5-9920-62f9e169f755/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Revolutionizing Public Sector Procurement: Harnessing the Power of DocuSign CLM and SAP Ariba</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:31:36</itunes:duration>
      <itunes:summary>Tune in to our podcast episode featuring DocuSign and SAP industry experts as they discuss how DocuSign CLM and SAP Ariba can streamline contract agreements, fortifying the connection between Public Sector agencies and suppliers.</itunes:summary>
      <itunes:subtitle>Tune in to our podcast episode featuring DocuSign and SAP industry experts as they discuss how DocuSign CLM and SAP Ariba can streamline contract agreements, fortifying the connection between Public Sector agencies and suppliers.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>247</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1ce58493-424d-45ce-a569-6ae33e3805d9</guid>
      <title>GovForward FedRAMP Headliner Summit: Stand in the Arena: Culture and the Cybersecurity and Infrastructure Security Agency</title>
      <description><![CDATA[In 2021, CISA Chief Information Officer Robert Costello made culture one of his top priorities. This moderated keynote will cover some of the challenges he faced, how his team addressed them, where those initiatives are delivering results, and why it’s important to have room to fail. 
]]></description>
      <pubDate>Mon, 5 Feb 2024 16:41:15 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Acquia, Carahsoft, GovExec)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-stand-in-the-arena-culture-and-the-cybersecurity-and-infrastructure-security-agency-O0HdSEqo</link>
      <enclosure length="19700537" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f4d37c05-dfbd-472d-950b-5c253a683ac2/audio/f782e610-572c-4ed0-b8fb-386fdebab149/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Stand in the Arena: Culture and the Cybersecurity and Infrastructure Security Agency</itunes:title>
      <itunes:author>Acquia, Carahsoft, GovExec</itunes:author>
      <itunes:duration>00:20:17</itunes:duration>
      <itunes:summary>In 2021, CISA Chief Information Officer Robert Costello made culture one of his top priorities. This moderated keynote will cover some of the challenges he faced, how his team addressed them, where those initiatives are delivering results, and why it’s important to have room to fail.</itunes:summary>
      <itunes:subtitle>In 2021, CISA Chief Information Officer Robert Costello made culture one of his top priorities. This moderated keynote will cover some of the challenges he faced, how his team addressed them, where those initiatives are delivering results, and why it’s important to have room to fail.</itunes:subtitle>
      <itunes:keywords>threats, customers, running, part, splunk, services, software, tech podcast, ocio, partners, baseline, years, cloud, critical infrastructure, office, cios, government, cyber threat, ciso, technology, vulnerabilities, cisa, networks, user experience, product, end user, data, threat actors, experience, talk, cyber, organizations, it, team, threat landscape, absolutely, automation, fedramp, environments, dhs, big, systems, agency, customer experience, cio, cybersecurity, security, human centered design, work, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>246</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">26d8ff0f-7094-4a79-b96b-7a678662c17e</guid>
      <title>GovForward FedRAMP Headliner Summit: Revolutionizing the Digital Landscape: From Secure Signatures to Content Authenticity</title>
      <description><![CDATA[Join us as we delve into the pivotal role of digital signatures, content security and authenticity in thwarting fraudulent documents and deep fakes leveraging FedRAMP authorized Adobe solutions. 
]]></description>
      <pubDate>Mon, 5 Feb 2024 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-revolutionizing-the-digital-landscape-from-secure-signatures-to-content-authenticity-2kh4vids</link>
      <enclosure length="16509616" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/932be2cf-103e-45af-9b79-7f71615a54e6/audio/eae76d82-49e2-43ed-ad1b-8817e989a54b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Revolutionizing the Digital Landscape: From Secure Signatures to Content Authenticity</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:17:11</itunes:duration>
      <itunes:summary>Join us as we delve into the pivotal role of digital signatures, content security and authenticity in thwarting fraudulent documents and deep fakes leveraging FedRAMP authorized Adobe solutions.</itunes:summary>
      <itunes:subtitle>Join us as we delve into the pivotal role of digital signatures, content security and authenticity in thwarting fraudulent documents and deep fakes leveraging FedRAMP authorized Adobe solutions.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>245</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">21e35af2-4685-4aae-ad76-ed036a5feffb</guid>
      <title>GovForward FedRAMP Headliner Summit: Value of FedRAMP Enterprise Solution Portfolio</title>
      <description><![CDATA[In today’s world, Federal agencies have successfully adopted individual cloud solutions that adhere to FedRAMP. The next frontier is to manage and adopt a portfolio of FedRAMP related cloud solutions to improve adoption and accelerate the innovation cycle. This session will review the recommendations and best practices for providing business users the full breath and scope of enterprise cloud solutions that address their FedRAMP requirements. 
]]></description>
      <pubDate>Fri, 2 Feb 2024 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-value-of-fedramp-enterprise-solution-portfolio-XB3GUCUU</link>
      <enclosure length="11175619" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7c1414b0-ad99-45bf-9af1-6d43fe48ebbf/audio/96c2df65-c6ea-4df5-830c-aa29bd31acd2/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Value of FedRAMP Enterprise Solution Portfolio</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:11:38</itunes:duration>
      <itunes:summary>In today’s world, Federal agencies have successfully adopted individual cloud solutions that adhere to FedRAMP. The next frontier is to manage and adopt a portfolio of FedRAMP related cloud solutions to improve adoption and accelerate the innovation cycle. This session will review the recommendations and best practices for providing business users the full breath and scope of enterprise cloud solutions that address their FedRAMP requirements.</itunes:summary>
      <itunes:subtitle>In today’s world, Federal agencies have successfully adopted individual cloud solutions that adhere to FedRAMP. The next frontier is to manage and adopt a portfolio of FedRAMP related cloud solutions to improve adoption and accelerate the innovation cycle. This session will review the recommendations and best practices for providing business users the full breath and scope of enterprise cloud solutions that address their FedRAMP requirements.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>244</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3adc303d-1848-4a4b-8d5e-93cb086e84d1</guid>
      <title>GovForward FedRAMP Headliner Summit: Transforming Customer Experience with the Cloud</title>
      <description><![CDATA[In this session, experts explore the benefits of cloud-based solutions, the impact artificial intelligence and other emerging technologies have on the infrastructure, and where more can be done to improve customer experience delivery. 
]]></description>
      <pubDate>Tue, 30 Jan 2024 20:07:49 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, GovExec)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-transforming-customer-experience-with-the-cloud-oKgujan4</link>
      <enclosure length="30328541" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/83f9a61e-bfc9-4717-8233-91e426e0bbfd/audio/3db04b24-ac84-4fc9-bee5-f518a6770910/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Transforming Customer Experience with the Cloud</itunes:title>
      <itunes:author>Carahsoft, GovExec</itunes:author>
      <itunes:duration>00:31:34</itunes:duration>
      <itunes:summary>In this session, experts explore the benefits of cloud-based solutions, the impact artificial intelligence and other emerging technologies have on the infrastructure, and where more can be done to improve customer experience delivery.</itunes:summary>
      <itunes:subtitle>In this session, experts explore the benefits of cloud-based solutions, the impact artificial intelligence and other emerging technologies have on the infrastructure, and where more can be done to improve customer experience delivery.</itunes:subtitle>
      <itunes:keywords>threats, focus, splunk, services, citizen, software, baseline, years, cloud, critical infrastructure, gabriel, government, cyber threat, happening, technology, vulnerabilities, networks, product, end user, data, threat actors, experience, talk, organizations, end user experience, it, threat landscape, absolutely, automation, fedramp, environments, oracle, tech podcast  human centered design, agency, customer experience, cybersecurity, enable, security, work, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>243</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c568c12-3176-43c8-a672-0b3c4cc00e23</guid>
      <title>GovForward FedRAMP Headliner Summit: Navigating the FedRAMP Certification: Best Practices and Challenges</title>
      <description><![CDATA[This session aims to provide a high-level overview of the FedRAMP certification process, including the essential steps, requirements, and challenges that vendors encounter along the way. Listeners will gain insights into the benefits of achieving FedRAMP compliance, the intricacies of preparing for and undergoing the assessment, and practical strategies for streamlining the certification process. Through a real-world example, the podcast will also highlight common pitfalls and share best practices for addressing them. 
]]></description>
      <pubDate>Fri, 26 Jan 2024 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-navigating-the-fedramp-certification-best-practices-and-challenges-HuK150m7</link>
      <enclosure length="4527483" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d09bdb2a-9c4d-45da-a008-252ff117298f/audio/157c3590-07d6-42a3-8618-5fd09a3ebf5b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Navigating the FedRAMP Certification: Best Practices and Challenges</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:04:42</itunes:duration>
      <itunes:summary>This session aims to provide a high-level overview of the FedRAMP certification process, including the essential steps, requirements, and challenges that vendors encounter along the way. Listeners will gain insights into the benefits of achieving FedRAMP compliance, the intricacies of preparing for and undergoing the assessment, and practical strategies for streamlining the certification process. Through a real-world example, the podcast will also highlight common pitfalls and share best practices for addressing them.</itunes:summary>
      <itunes:subtitle>This session aims to provide a high-level overview of the FedRAMP certification process, including the essential steps, requirements, and challenges that vendors encounter along the way. Listeners will gain insights into the benefits of achieving FedRAMP compliance, the intricacies of preparing for and undergoing the assessment, and practical strategies for streamlining the certification process. Through a real-world example, the podcast will also highlight common pitfalls and share best practices for addressing them.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>242</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e7f62d9c-8360-457a-8c39-3e15f46b2887</guid>
      <title>GovForward FedRAMP Headliner Summit: The Role of Data &amp; Risk Management in the New Threat Landscape</title>
      <description><![CDATA[In this session, experts in government and industry weigh in on the technology and tactics necessary to stay one step ahead of the next threat. 
]]></description>
      <pubDate>Thu, 25 Jan 2024 17:35:09 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, GovExec)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-the-role-of-data-risk-management-in-the-new-threat-landscape-Te0CmNQN</link>
      <enclosure length="32836965" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/be3ca87e-c51f-4a87-9dd8-6b7d3f9132c1/audio/607bb615-3348-47b4-a63c-c1d275140d02/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: The Role of Data &amp; Risk Management in the New Threat Landscape</itunes:title>
      <itunes:author>Carahsoft, GovExec</itunes:author>
      <itunes:duration>00:34:10</itunes:duration>
      <itunes:summary>In this session, experts in government and industry weigh in on the technology and tactics necessary to stay one step ahead of the next threat.</itunes:summary>
      <itunes:subtitle>In this session, experts in government and industry weigh in on the technology and tactics necessary to stay one step ahead of the next threat.</itunes:subtitle>
      <itunes:keywords>threats, splunk, software, baseline, critical infrastructure, gabriel, government, cyber threat, technology, vulnerabilities, networks, data, threat actors, talk, organizations, it, threat landscape, absolutely, automation, fedramp, oracle, cybersecurity, security, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>241</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e97c0f72-6291-4434-bdf7-dec67bff126b</guid>
      <title>GovForward FedRAMP Headliner Summit: Unpacking Sponsorships</title>
      <description><![CDATA[This session myth busts the process to outline best practices agencies and industry partners can follow, provide tangible solutions to the more complicated elements of FedRAMP authorization, and mitigate roadblocks in collaboration opportunities. 
]]></description>
      <pubDate>Wed, 24 Jan 2024 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-unpacking-sponsorships-lZqmGRsk</link>
      <enclosure length="33294179" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0b2b2e61-4df9-4bd9-901f-1dd84001c394/audio/52f5e338-826b-4f35-b3ad-ae2d154137d3/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Unpacking Sponsorships</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:34:40</itunes:duration>
      <itunes:summary>This session myth busts the process to outline best practices agencies and industry partners can follow, provide tangible solutions to the more complicated elements of FedRAMP authorization, and mitigate roadblocks in collaboration opportunities.</itunes:summary>
      <itunes:subtitle>This session myth busts the process to outline best practices agencies and industry partners can follow, provide tangible solutions to the more complicated elements of FedRAMP authorization, and mitigate roadblocks in collaboration opportunities.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>240</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3fe45737-8a3a-4364-85f1-9a4840350f70</guid>
      <title>GovForward FedRAMP Headliner Summit: The Role of Authorization in Hybrid and Cloud Environments</title>
      <description><![CDATA[Better managing access control is critical to adopting Zero Trust best practices. As you move to the cloud, managing access to your data, apps, and APIs in a hybrid environment becomes even more challenging. Join this session to understand why authorization is more relevant now than ever and how fine-grained authorization gives you the level of security needed to lay the foundation for Zero Trust. 
]]></description>
      <pubDate>Mon, 22 Jan 2024 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-the-role-of-authorization-in-hybrid-and-cloud-environments-wcFQZ8rN</link>
      <enclosure length="28105808" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/eef74bbc-a793-4869-9839-5a2060f3c0cc/audio/63fe5e0e-c270-457f-8256-9137c641736b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: The Role of Authorization in Hybrid and Cloud Environments</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:29:16</itunes:duration>
      <itunes:summary>Better managing access control is critical to adopting Zero Trust best practices. As you move to the cloud, managing access to your data, apps, and APIs in a hybrid environment becomes even more challenging. Join this session to understand why authorization is more relevant now than ever and how fine-grained authorization gives you the level of security needed to lay the foundation for Zero Trust.</itunes:summary>
      <itunes:subtitle>Better managing access control is critical to adopting Zero Trust best practices. As you move to the cloud, managing access to your data, apps, and APIs in a hybrid environment becomes even more challenging. Join this session to understand why authorization is more relevant now than ever and how fine-grained authorization gives you the level of security needed to lay the foundation for Zero Trust.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>239</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">971718b3-99a0-4c18-ae75-6f4f5d2e84f8</guid>
      <title>GovForward FedRAMP Headliner Summit: FedRAMP’ing- The Key to Accelerating Cyber Defense Improvements</title>
      <description><![CDATA[Improving this nation’s cyber defense has been a consistent theme and called out in federal guidance issued by the White House with Executive Order 14028, the National Cybersecurity Strategy, as well as CISA’s Strategic Plan 2023–2025. To accelerate improvements in cyber defense for federal agencies, Cloud Service Providers (CSP) must continue to adopt FedRamp practices to usher in needed innovation to elevate this nation’s cyber defense capabilities. OpenText Cybersecurity is poised to help this nation in Defending and Protecting Forward by offering a range of cloud services and capabilities to anticipate, adapt and evolve cyber defenses to counter threat actors’ behaviors and activities. 
]]></description>
      <pubDate>Fri, 19 Jan 2024 16:12:29 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-fedramping-the-key-to-accelerating-cyber-defense-improvements-EgDke3Te</link>
      <enclosure length="29171994" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d18ce85c-366b-461f-8912-377581f14d84/audio/2261f0b6-e8d3-4d95-bb89-e72dcdcfb408/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: FedRAMP’ing- The Key to Accelerating Cyber Defense Improvements</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:30:22</itunes:duration>
      <itunes:summary>Improving this nation’s cyber defense has been a consistent theme and called out in federal guidance issued by the White House with Executive Order 14028, the National Cybersecurity Strategy, as well as CISA’s Strategic Plan 2023–2025. To accelerate improvements in cyber defense for federal agencies, Cloud Service Providers (CSP) must continue to adopt FedRamp practices to usher in needed innovation to elevate this nation’s cyber defense capabilities. OpenText Cybersecurity is poised to help this nation in Defending and Protecting Forward by offering a range of cloud services and capabilities to anticipate, adapt and evolve cyber defenses to counter threat actors’ behaviors and activities.</itunes:summary>
      <itunes:subtitle>Improving this nation’s cyber defense has been a consistent theme and called out in federal guidance issued by the White House with Executive Order 14028, the National Cybersecurity Strategy, as well as CISA’s Strategic Plan 2023–2025. To accelerate improvements in cyber defense for federal agencies, Cloud Service Providers (CSP) must continue to adopt FedRamp practices to usher in needed innovation to elevate this nation’s cyber defense capabilities. OpenText Cybersecurity is poised to help this nation in Defending and Protecting Forward by offering a range of cloud services and capabilities to anticipate, adapt and evolve cyber defenses to counter threat actors’ behaviors and activities.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>238</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5f627eb6-5db5-4223-965f-ff922b6b9b2c</guid>
      <title>Out with the Old, In with the New: What&apos;s Ahead for FedRamp</title>
      <description><![CDATA[GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements. 
]]></description>
      <pubDate>Tue, 9 Jan 2024 15:27:24 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, GovExec, Tenable)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/out-with-the-old-in-with-the-new-whats-ahead-for-fedramp-LBeaXRjp</link>
      <enclosure length="21586796" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fb71c642-4c8c-447b-81d5-52c191f7447e/audio/e20b8864-de93-49d3-b2a6-12e7fa863441/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Out with the Old, In with the New: What&apos;s Ahead for FedRamp</itunes:title>
      <itunes:author>Carahsoft, GovExec, Tenable</itunes:author>
      <itunes:duration>00:22:28</itunes:duration>
      <itunes:summary>GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements.</itunes:summary>
      <itunes:subtitle>GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements.</itunes:subtitle>
      <itunes:keywords>threats, authorization, talking, exploits, algorithms, landscape, organizations, agencies, compliance, fedramp, vulnerability, year, cybersecurity, fips, evolving, continue, security, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>237</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bad32d0e-462b-4c46-8ecf-da48b11c5f85</guid>
      <title>Cultivating Soft Skills for Effective Government Hiring and Talent Efficiency</title>
      <description><![CDATA[During this podcast, our experts will go over the essential soft skills that are crucial for government hiring, including communication, integrity, and safety behavior. 
]]></description>
      <pubDate>Wed, 3 Jan 2024 18:08:03 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cultivating-soft-skills-for-effective-government-hiring-and-talent-efficiency-Z4Ne1yja</link>
      <enclosure length="34848763" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b4d417a6-60c9-4f55-a68e-1db0f72cd77d/audio/9831bfa3-ca80-4a7b-9ede-cba162272776/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cultivating Soft Skills for Effective Government Hiring and Talent Efficiency</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:36:17</itunes:duration>
      <itunes:summary>During this podcast, our experts will go over the essential soft skills that are crucial for government hiring, including communication, integrity, and safety behavior.</itunes:summary>
      <itunes:subtitle>During this podcast, our experts will go over the essential soft skills that are crucial for government hiring, including communication, integrity, and safety behavior.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>235</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ccaee197-6c83-4bb7-94eb-ae79c8b48b35</guid>
      <title>Ready for 2024: How Coordinated Vulnerability Disclosure Can Boost Election Integrity and Public Perception</title>
      <description><![CDATA[Join our webinar focusing on the imminent 2024 election concerns. A panel of cybersecurity and election integrity experts will uncover new coordinated vulnerability disclosure (CVD) practices, sharing insights from recent hacker challenges and discussing how CVD can fortify your security measures while enhancing trust with constituents. 
]]></description>
      <pubDate>Thu, 28 Dec 2023 19:02:22 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ready-for-2024-how-coordinated-vulnerability-disclosure-can-boost-election-integrity-and-public-perception-y7Hcs5d9</link>
      <enclosure length="54472430" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/070e24e1-7fba-440b-9ded-e138f57f578e/audio/7c8be208-0535-47e5-a146-5ce971d7d979/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ready for 2024: How Coordinated Vulnerability Disclosure Can Boost Election Integrity and Public Perception</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:56:44</itunes:duration>
      <itunes:summary>Join our webinar focusing on the imminent 2024 election concerns. A panel of cybersecurity and election integrity experts will uncover new coordinated vulnerability disclosure (CVD) practices, sharing insights from recent hacker challenges and discussing how CVD can fortify your security measures while enhancing trust with constituents.</itunes:summary>
      <itunes:subtitle>Join our webinar focusing on the imminent 2024 election concerns. A panel of cybersecurity and election integrity experts will uncover new coordinated vulnerability disclosure (CVD) practices, sharing insights from recent hacker challenges and discussing how CVD can fortify your security measures while enhancing trust with constituents.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>234</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">563b92c9-8b00-4c7f-9c87-5c85397f347c</guid>
      <title>Innovating Service Delivery to Constituents</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Thu, 28 Dec 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/innovating-service-delivery-to-constituents-8zqLaxAI</link>
      <enclosure length="58519817" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/954d487c-b1ed-431b-b1eb-482b4db1556d/audio/aa49e58f-7a6f-4858-a3ea-2ac95a5cfdc3/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Innovating Service Delivery to Constituents</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>01:00:46</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>231</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8f02e7e0-f830-4a70-9b51-2cac6259de5f</guid>
      <title>Assessing the Impact of AI</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Thu, 28 Dec 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/assessing-the-impact-of-ai-kvdnslHw</link>
      <enclosure length="49004434" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ec6c990d-2f25-4077-a807-9244dbdfdb86/audio/118f8294-5aa4-4c5b-84f0-7f16b31b886b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Assessing the Impact of AI</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:50:51</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>232</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59bc79e7-a201-4bb0-a87e-10775793c141</guid>
      <title>Cybersecurity and the Current Threat Landscape</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Thu, 28 Dec 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cybersecurity-and-the-current-threat-landscape-gzkhjJjZ</link>
      <enclosure length="60505939" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/876ad775-9338-4bd0-ba94-a7905068157b/audio/0657bd62-0f17-4212-b582-f3c380950a6d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cybersecurity and the Current Threat Landscape</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>01:02:51</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>233</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">16b993c7-2e98-47da-a2af-c4d30d5a1d48</guid>
      <title>Who’s Minding the Keys to the Kingdom: The Importance of Encryption, Key Management and Root of Trust</title>
      <description><![CDATA[Listen to our podcast episode featuring Entrust industry experts to discover how agencies leverage HSM encryption to store, protect and manage cryptographic keys. 
]]></description>
      <pubDate>Mon, 18 Dec 2023 16:19:04 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Entrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/whos-minding-the-keys-to-the-kingdom-the-importance-of-encryption-key-management-and-root-of-trust-aL5guPYH</link>
      <enclosure length="19361762" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f7ff5b6e-a880-4053-9f5a-66c58d5336a3/audio/70389841-1447-4e4a-94cd-8440ea60a1a5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Who’s Minding the Keys to the Kingdom: The Importance of Encryption, Key Management and Root of Trust</itunes:title>
      <itunes:author>Carahsoft, Entrust</itunes:author>
      <itunes:duration>00:20:08</itunes:duration>
      <itunes:summary>Listen to our podcast episode featuring Entrust industry experts to discover how agencies leverage HSM encryption to store, protect and manage cryptographic keys.</itunes:summary>
      <itunes:subtitle>Listen to our podcast episode featuring Entrust industry experts to discover how agencies leverage HSM encryption to store, protect and manage cryptographic keys.</itunes:subtitle>
      <itunes:keywords>customers, cryptography, public key algorithm, pki, pki breach, blockchain, keys, organization, entrust hsm, hardware security module, code signing, protect, digital payments, hsm, cloud, cryptographic keys, secure, entrust encryption, encryption, public key encryption algorithm, hsm key management, key management, environment, iot, data, talk, certificate authority, hardware, entrust, certificates, hsm network, how to manage encryption keys, hsm encryption, hardware security modules (hsms), compromised, issuing, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>230</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c96e00fe-3dde-477d-bf2a-a33c334c9ad4</guid>
      <title>Establishing Boundaries in Today&apos;s Data Centers with Juniper Networks and Dell Technologies</title>
      <description><![CDATA[Watch the Juniper Networks and Dell Technologies podcast to learn how your organization can meet Zero Trust requirements by establishing and managing user access to critical data centers and IT infrastructures. Learn about Juniper’s Apstra solution to establish a holistic approach to Zero Trust networking. 
]]></description>
      <pubDate>Fri, 8 Dec 2023 17:50:24 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Juniper Networks, Carahsoft, Dell Technologies)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/establishing-boundaries-in-todays-data-centers-with-juniper-networks-and-dell-technologies-Jfu_f6fN</link>
      <enclosure length="39033915" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/23392b6a-e3ad-4af2-8441-8434431b0586/audio/608a0391-cbc0-44c8-abb3-9c5848f53139/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Establishing Boundaries in Today&apos;s Data Centers with Juniper Networks and Dell Technologies</itunes:title>
      <itunes:author>Juniper Networks, Carahsoft, Dell Technologies</itunes:author>
      <itunes:duration>00:40:36</itunes:duration>
      <itunes:summary>Watch the Juniper Networks and Dell Technologies podcast to learn how your organization can meet Zero Trust requirements by establishing and managing user access to critical data centers and IT infrastructures. Learn about Juniper’s Apstra solution to establish a holistic approach to Zero Trust networking.</itunes:summary>
      <itunes:subtitle>Watch the Juniper Networks and Dell Technologies podcast to learn how your organization can meet Zero Trust requirements by establishing and managing user access to critical data centers and IT infrastructures. Learn about Juniper’s Apstra solution to establish a holistic approach to Zero Trust networking.</itunes:subtitle>
      <itunes:keywords>it infrastructure boundaries, system, dell, juniper, juniper apstra, data center infrastructure manager, solutions, network, data center security, secure data center, data center boundaries management, zero trust, network infrastructure security, data center security manager, infrastructure, data center, zero trust security, products, data center network, data center security standards, vendor, building, automation, managing boundaries, ideas, virtualization mechanisms, silos, cybersecurity, security, perspective, ai, zero trust security architecture</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>229</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f217b216-e874-4d38-9e67-dd3691b8aac3</guid>
      <title>Brand Protection and Enhanced Email Security with DMARC</title>
      <description><![CDATA[Listen to Mimecast's podcast to learn how Public Sector agencies enforce DMARC policies to streamline email security. Reject & quarantine phishing attacks now. 
]]></description>
      <pubDate>Thu, 16 Nov 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/brand-protection-and-enhanced-email-security-with-dmarc-KbnbE_ah</link>
      <enclosure length="29412854" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f48771e9-301a-4b5f-a8ce-b56ae0c6ff24/audio/b38b8485-1f08-4499-a3e5-ca4f93470406/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Brand Protection and Enhanced Email Security with DMARC</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:30:37</itunes:duration>
      <itunes:summary>Listen to Mimecast&apos;s podcast to learn how Public Sector agencies enforce DMARC policies to streamline email security. Reject &amp; quarantine phishing attacks now.</itunes:summary>
      <itunes:subtitle>Listen to Mimecast&apos;s podcast to learn how Public Sector agencies enforce DMARC policies to streamline email security. Reject &amp; quarantine phishing attacks now.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>228</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">79102e86-150e-47c0-9e7f-b61a2f08827d</guid>
      <title>Venafi Simplifies the Public Sector’s Adoption of CA/Browser Forum Requirements</title>
      <description><![CDATA[In this podcast, Venafi experts Faisal Razzak, Senior Product Manager, and Ivan Wallis, Global Solutions Architect,  discuss best practices for leveraging encryption key management software to comply with the CA/B Forum guidelines.   By leveraging Venafi’s technology, your agency can secure code signing operations to maintain data integrity. 
]]></description>
      <pubDate>Wed, 1 Nov 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/venafi-simplifies-the-public-sectors-adoption-of-ca-browser-forum-requirements-7v6CVXII</link>
      <enclosure length="32420109" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/50500a3a-3269-48c8-b694-928d44164c4e/audio/40788728-1a93-4a91-a571-36eb4235c072/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Venafi Simplifies the Public Sector’s Adoption of CA/Browser Forum Requirements</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:33:45</itunes:duration>
      <itunes:summary>In this podcast, Venafi experts Faisal Razzak, Senior Product Manager, and Ivan Wallis, Global Solutions Architect,  discuss best practices for leveraging encryption key management software to comply with the CA/B Forum guidelines.   By leveraging Venafi’s technology, your agency can secure code signing operations to maintain data integrity.</itunes:summary>
      <itunes:subtitle>In this podcast, Venafi experts Faisal Razzak, Senior Product Manager, and Ivan Wallis, Global Solutions Architect,  discuss best practices for leveraging encryption key management software to comply with the CA/B Forum guidelines.   By leveraging Venafi’s technology, your agency can secure code signing operations to maintain data integrity.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>227</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a28829ff-c5dc-4a24-9c28-692981d712f2</guid>
      <title>GovForward FedRAMP Headliner Summit: StateRAMP: Where are They Now?</title>
      <description><![CDATA[GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements.

Stay current with the latest developments in cloud computing and federal cybersecurity by accessing the on-demand sessions from this year’s conference. Discover how secure cloud computing solutions can shape the future of your agency or organization. 
]]></description>
      <pubDate>Mon, 23 Oct 2023 20:56:26 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-stateramp-where-are-they-now-1q9ptSon</link>
      <enclosure length="23909092" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/09d68373-1e46-41b0-bf04-4658eeded138/audio/8aea4282-832d-480b-9a74-39dac3c84884/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: StateRAMP: Where are They Now?</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:24:53</itunes:duration>
      <itunes:summary>GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements.

Stay current with the latest developments in cloud computing and federal cybersecurity by accessing the on-demand sessions from this year’s conference. Discover how secure cloud computing solutions can shape the future of your agency or organization.</itunes:summary>
      <itunes:subtitle>GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements.

Stay current with the latest developments in cloud computing and federal cybersecurity by accessing the on-demand sessions from this year’s conference. Discover how secure cloud computing solutions can shape the future of your agency or organization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>226</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">50c296db-e863-4489-ba94-20f0ffdcbc9d</guid>
      <title>GovForward FedRAMP Headliner Summit: Streamlining FedRAMP Authorizations with Automation and Data Standards</title>
      <description><![CDATA[GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements. Today's speaker is Anil Karmel (Co-Founder and CEO, RegScale). 
]]></description>
      <pubDate>Wed, 18 Oct 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-streamlining-fedramp-authorizations-with-automation-and-data-standards-_pxHrAk_</link>
      <enclosure length="17012036" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9eaa4313-a377-4f08-a09c-c1e3af26ed47/audio/e35b4c41-8929-46b8-b349-d1329ef0cfe9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Streamlining FedRAMP Authorizations with Automation and Data Standards</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:17:42</itunes:duration>
      <itunes:summary>GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements. Today&apos;s speaker is Anil Karmel (Co-Founder and CEO, RegScale).</itunes:summary>
      <itunes:subtitle>GovExec and Carahsoft co-hosted the annual GovForward FedRAMP Summit in Washington, D.C. to discuss the evolving threat landscape of federal cloud adoption. This event brings together government experts and industry innovators to examine the impact of threat-based cloud adoption, Federal policy changes and the power of knowledge sharing that drives technological advancements. Today&apos;s speaker is Anil Karmel (Co-Founder and CEO, RegScale).</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>225</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e85cfab6-d248-40e7-9ed1-e074c0a4f75a</guid>
      <title>The Business of Ransomware-as-a-Service Explained with Halcyon</title>
      <description><![CDATA[Listen to the podcast to hear Anthony Freed, Director of Strategic Communications and Threat Intelligence at Halcyon, discuss top threat agents and current trends influencing the underground ransomware-as-a-service industry. 
]]></description>
      <pubDate>Mon, 16 Oct 2023 19:52:51 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Halcyon, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-business-of-ransomware-as-a-service-explained-with-halcyon-KZVV9vbK</link>
      <enclosure length="26236989" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f6e514a5-6e1a-4fd0-a6cd-c1f281fe0535/audio/7f46aaa9-777c-40ed-a603-5d18c749aa8c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Business of Ransomware-as-a-Service Explained with Halcyon</itunes:title>
      <itunes:author>Halcyon, Carahsoft</itunes:author>
      <itunes:duration>00:27:18</itunes:duration>
      <itunes:summary>Listen to the podcast to hear Anthony Freed, Director of Strategic Communications and Threat Intelligence at Halcyon, discuss top threat agents and current trends influencing the underground ransomware-as-a-service industry.</itunes:summary>
      <itunes:subtitle>Listen to the podcast to hear Anthony Freed, Director of Strategic Communications and Threat Intelligence at Halcyon, discuss top threat agents and current trends influencing the underground ransomware-as-a-service industry.</itunes:subtitle>
      <itunes:keywords>halcyon ransomware, cybercrime, attackers, mentioned, halcyon, network, ras, cyber resilience, ransomware-as-a-service, move, cyberthreat, ransomware attacks, platforms, cybercrime business model, threat actors, report, organizations, anti-ransomware software, threat detection and prevention, operations, attacks, affiliates, ransomware protection services, cybercrime ecosystem, rasp, linux, cyber attacks, cybersecurity, halcyon security, ransomware, groups, initial access brokers</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>224</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">891e2b4a-1b67-44d5-b54f-83e53872c6f1</guid>
      <title>GovForward FedRAMP Headliner Summit: Opening Keynote</title>
      <description><![CDATA[Amid government’s sweeping migration to the cloud, pressure to update FedRAMP policies has long been building among legislators. Where do key policymakers priorities lie in the future for cloud adoption efforts? In this session, the 2023 FedRAMP Summit kicks off with critical insights from the legislators driving change for cloud. 
]]></description>
      <pubDate>Fri, 13 Oct 2023 16:17:09 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (GovExec, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/govforward-fedramp-headliner-summit-opening-keynote-QF_n_9Ud</link>
      <enclosure length="8125338" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4ff2e6e9-9bf1-4d96-99f3-f88743147ddc/audio/d11d9337-41a9-48b3-b358-6d4a37b5552d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>GovForward FedRAMP Headliner Summit: Opening Keynote</itunes:title>
      <itunes:author>GovExec, Carahsoft</itunes:author>
      <itunes:duration>00:08:27</itunes:duration>
      <itunes:summary>Amid government’s sweeping migration to the cloud, pressure to update FedRAMP policies has long been building among legislators. Where do key policymakers priorities lie in the future for cloud adoption efforts? In this session, the 2023 FedRAMP Summit kicks off with critical insights from the legislators driving change for cloud.</itunes:summary>
      <itunes:subtitle>Amid government’s sweeping migration to the cloud, pressure to update FedRAMP policies has long been building among legislators. Where do key policymakers priorities lie in the future for cloud adoption efforts? In this session, the 2023 FedRAMP Summit kicks off with critical insights from the legislators driving change for cloud.</itunes:subtitle>
      <itunes:keywords>adoption, cloud services, authorization, software, cloud adoption, federal government, cloud, authorized, based, government, today, zero trust, cloud computing, ensure, increase, intel, cyberattacks, ransomeware, it, respondents, federal, federal agencies, fedramp, gerry connolly, agency, cybersecurity, continue</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>223</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30242827-20dc-4493-9d15-c0377081a291</guid>
      <title>Combating Cyber Threats in Government</title>
      <description><![CDATA[Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.

SUBSCRIBE to get the latest tech tips & tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community 
]]></description>
      <pubDate>Wed, 4 Oct 2023 17:12:45 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/combating-cyber-threats-in-government-isjKw6Vb</link>
      <enclosure length="42994447" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c5e88929-2525-4114-9894-84ae19acb3f8/audio/9e25409a-49ce-4259-b91c-ab1571f9e8ae/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Combating Cyber Threats in Government</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:44:46</itunes:duration>
      <itunes:summary>Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community</itunes:summary>
      <itunes:subtitle>Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>221</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28b2987a-4974-4dd0-9bdf-3f2b23d8c2bd</guid>
      <title>Building a Resilient Government</title>
      <description><![CDATA[Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.

SUBSCRIBE to get the latest tech tips & tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community 
]]></description>
      <pubDate>Wed, 4 Oct 2023 17:12:20 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/building-a-resilient-government-99FKl25r</link>
      <enclosure length="47155662" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/869ed0eb-e793-400c-b55c-a04d62d0f8ae/audio/4ad39236-36a4-4900-8778-77666b6a790e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Building a Resilient Government</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:49:06</itunes:duration>
      <itunes:summary>Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community</itunes:summary>
      <itunes:subtitle>Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>222</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">22453bb3-c144-4b28-865f-f03a9d41978d</guid>
      <title>A Bourbon Talk: Episode 2 (Tech Tasting Storytelling Podcast Series)</title>
      <description><![CDATA[A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. A special edition episode at Dell Technologies World 2023 with special guests Cris Tobin (Vice President of Federal Sales at Red River), Bogdan Frusina (Founder of Dejero), and Dan Romanelli (Senior Director OEM Federal Sales at Dell Technologies).   
]]></description>
      <pubDate>Mon, 2 Oct 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/a-bourbon-talk-episode-2-tech-tasting-storytelling-podcast-series-yJPR8eNw</link>
      <enclosure length="18358004" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c925c1d1-ff7b-4bbe-8dc0-f1b979a12f60/audio/bcaff273-6e1b-4830-a86c-2f22b15b7c74/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A Bourbon Talk: Episode 2 (Tech Tasting Storytelling Podcast Series)</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:19:06</itunes:duration>
      <itunes:summary>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. A special edition episode at Dell Technologies World 2023 with special guests Cris Tobin (Vice President of Federal Sales at Red River), Bogdan Frusina (Founder of Dejero), and Dan Romanelli (Senior Director OEM Federal Sales at Dell Technologies).  </itunes:summary>
      <itunes:subtitle>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. A special edition episode at Dell Technologies World 2023 with special guests Cris Tobin (Vice President of Federal Sales at Red River), Bogdan Frusina (Founder of Dejero), and Dan Romanelli (Senior Director OEM Federal Sales at Dell Technologies).  </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>220</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a0513ee-e95f-4ee5-9bfb-2daef871af01</guid>
      <title>Technology Innovation in Government</title>
      <description><![CDATA[Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT. 
]]></description>
      <pubDate>Tue, 26 Sep 2023 13:49:01 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/technology-innovation-in-government-Z5fCLjaj</link>
      <enclosure length="57866535" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/cc98eff1-4ac5-4662-bb67-11e2590920a3/audio/9f18e723-fc71-42c4-8999-790e226c2a34/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Technology Innovation in Government</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>01:00:16</itunes:duration>
      <itunes:summary>Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.</itunes:summary>
      <itunes:subtitle>Join us as thought leaders from Ohio agencies and the business community discuss their high-level vision and day-to-day objectives in adopting new technologies to revolutionize government IT.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>219</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">39898584-a50a-46ba-872d-6d0c6cc850d2</guid>
      <title>A Bourbon Talk: Episode 4 (Tech Tasting Storytelling Podcast Series)</title>
      <description><![CDATA[A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology.  For today’s topic, our special guests are James Ebler, Chief Technology Officer at Three Wire and Mark Harman, Sr. Security Systems Engineer at Versa Networks.  
]]></description>
      <pubDate>Wed, 20 Sep 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bourbon-tech-episode-3-a-bourbon-talk-tech-tasting-storytelling-podcast-series-Vhz8EUZx</link>
      <enclosure length="20107153" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/3175ecfc-4cd8-41dd-a0a4-b55ee4d84003/audio/575136b3-ada5-4172-88e4-df88c4302719/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A Bourbon Talk: Episode 4 (Tech Tasting Storytelling Podcast Series)</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:20:56</itunes:duration>
      <itunes:summary>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology.  For today’s topic, our special guests are James Ebler, Chief Technology Officer at Three Wire and Mark Harman, Sr. Security Systems Engineer at Versa Networks. </itunes:summary>
      <itunes:subtitle>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology.  For today’s topic, our special guests are James Ebler, Chief Technology Officer at Three Wire and Mark Harman, Sr. Security Systems Engineer at Versa Networks. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>218</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8bdf999b-e692-4ebe-9e2e-86229bdff941</guid>
      <title>Future-Proof Your Agency Workforce: Transform HR with AI</title>
      <description><![CDATA[In this podcast, Mike Hofer, SAP Executive HXM Value Advisor, and Dan Hopkins, Eightfold.AI Global Public Sector VP, review emerging trends in HR and discuss how integrating SAP and Eightfold.AI technologies improve employee experiences in the public sector. 
]]></description>
      <pubDate>Thu, 7 Sep 2023 17:10:51 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (SAP, Carahsoft, Eightfold.AI)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/future-proof-your-agency-workforce-transform-hr-with-ai-S3ZYztRc</link>
      <enclosure length="47695757" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4bad8844-9aba-4ffd-974e-f692229ca79c/audio/82609f4b-3380-4648-ace5-61f80bddd98e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Future-Proof Your Agency Workforce: Transform HR with AI</itunes:title>
      <itunes:author>SAP, Carahsoft, Eightfold.AI</itunes:author>
      <itunes:duration>00:49:39</itunes:duration>
      <itunes:summary>In this podcast, Mike Hofer, SAP Executive HXM Value Advisor, and Dan Hopkins, Eightfold.AI Global Public Sector VP, review emerging trends in HR and discuss how integrating SAP and Eightfold.AI technologies improve employee experiences in the public sector.</itunes:summary>
      <itunes:subtitle>In this podcast, Mike Hofer, SAP Executive HXM Value Advisor, and Dan Hopkins, Eightfold.AI Global Public Sector VP, review emerging trends in HR and discuss how integrating SAP and Eightfold.AI technologies improve employee experiences in the public sector.</itunes:subtitle>
      <itunes:keywords>workforce, talent intelligence platform, candidates, talent, talent intelligence software, software, job recruitment, ai talent acquisition, eightfold, trends, future-proof organization, success factors, hr digital transformation, technology, recruitment, hr, hr process digitization, emerging hr trends, artificial intelligence, data, transforming human resources, talk, organizations, skills, job, ai in hiring, hr digitalization, human resources, understand, hr technology integration, employees, hiring, digital talent management, future-proof workforce, role, enable, creating, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>217</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">49ebd414-fed2-4a98-bc3b-dad0a5d9d929</guid>
      <title>What’s All the Plus+ About? - Carahsoft’s VMware vSphere+ Podcast</title>
      <description><![CDATA[Take the next step in your hybrid-cloud journey with vSphere+, unifying lifecycle management for current and next generation workloads! Embrace next generation Kubernetes applications without having to refactor your datacenter with vSphere+! Unify multi-cloud management while supporting current and next generation applications with license-less vSphere+. Run VM & container workloads anywhere from a unified management plane with vSphere+! Bring the benefits of the cloud, next-gen containerization, and cut through the chaos with vSphere+!
 
]]></description>
      <pubDate>Tue, 22 Aug 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/whats-all-the-plus-about-carahsofts-vmware-vsphere-podcast-i5RlRT_h</link>
      <enclosure length="30804388" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/340a092c-439c-459d-8457-c54b857db676/audio/2a3bf650-a8ce-4a74-b97c-35fbe3d967a4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>What’s All the Plus+ About? - Carahsoft’s VMware vSphere+ Podcast</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:32:04</itunes:duration>
      <itunes:summary>Take the next step in your hybrid-cloud journey with vSphere+, unifying lifecycle management for current and next generation workloads! Embrace next generation Kubernetes applications without having to refactor your datacenter with vSphere+! Unify multi-cloud management while supporting current and next generation applications with license-less vSphere+. Run VM &amp; container workloads anywhere from a unified management plane with vSphere+! Bring the benefits of the cloud, next-gen containerization, and cut through the chaos with vSphere+!
</itunes:summary>
      <itunes:subtitle>Take the next step in your hybrid-cloud journey with vSphere+, unifying lifecycle management for current and next generation workloads! Embrace next generation Kubernetes applications without having to refactor your datacenter with vSphere+! Unify multi-cloud management while supporting current and next generation applications with license-less vSphere+. Run VM &amp; container workloads anywhere from a unified management plane with vSphere+! Bring the benefits of the cloud, next-gen containerization, and cut through the chaos with vSphere+!
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>215</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2843119e-1032-4b0c-9b93-c16c5c6a7c13</guid>
      <title>LiveAction 21-31 Podcast</title>
      <description><![CDATA[Meet requirements outlined in OMB M-21-31 from tier 0 to 3 and Zero Trust while effectively facilitating network monitoring and analytics with the help of LiveAction solutions.  

In Carahsoft’s podcast, Navigating OMB M-21-31 and Zero Trust Compliance with Expert Insights from LiveAction, you will learn how LiveAction helps federal agencies support the requirements outlined in OMB M-21-31, including implementation and planning strategies, as well as caveats to watch out for.  

Joining Carahsoft, LiveAction's CTO and Founder, John Smith, sheds light on the specific requirements for each tier, emphasizing the urgency federal agencies face in meeting the mandate's obligations. Learn how LiveNX, LiveWire, and ThreatEye can play a pivotal role in fulfilling tier 0 - 3 network requirements, leveraging packet capture, encrypted traffic analysis and user behavior insights, cloud and network flow logs, SNMP, and centralized access.  
]]></description>
      <pubDate>Thu, 3 Aug 2023 20:08:32 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/liveaction-21-31-podcast-FU8rzUBM</link>
      <enclosure length="17588360" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/09ffa70b-c9cb-486c-ac58-f7dd1e309733/audio/d4bc8e5e-1883-463c-8492-ab47b8fa5a43/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>LiveAction 21-31 Podcast</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:18:18</itunes:duration>
      <itunes:summary>Meet requirements outlined in OMB M-21-31 from tier 0 to 3 and Zero Trust while effectively facilitating network monitoring and analytics with the help of LiveAction solutions.  

In Carahsoft’s podcast, Navigating OMB M-21-31 and Zero Trust Compliance with Expert Insights from LiveAction, you will learn how LiveAction helps federal agencies support the requirements outlined in OMB M-21-31, including implementation and planning strategies, as well as caveats to watch out for.  

Joining Carahsoft, LiveAction&apos;s CTO and Founder, John Smith, sheds light on the specific requirements for each tier, emphasizing the urgency federal agencies face in meeting the mandate&apos;s obligations. Learn how LiveNX, LiveWire, and ThreatEye can play a pivotal role in fulfilling tier 0 - 3 network requirements, leveraging packet capture, encrypted traffic analysis and user behavior insights, cloud and network flow logs, SNMP, and centralized access. </itunes:summary>
      <itunes:subtitle>Meet requirements outlined in OMB M-21-31 from tier 0 to 3 and Zero Trust while effectively facilitating network monitoring and analytics with the help of LiveAction solutions.  

In Carahsoft’s podcast, Navigating OMB M-21-31 and Zero Trust Compliance with Expert Insights from LiveAction, you will learn how LiveAction helps federal agencies support the requirements outlined in OMB M-21-31, including implementation and planning strategies, as well as caveats to watch out for.  

Joining Carahsoft, LiveAction&apos;s CTO and Founder, John Smith, sheds light on the specific requirements for each tier, emphasizing the urgency federal agencies face in meeting the mandate&apos;s obligations. Learn how LiveNX, LiveWire, and ThreatEye can play a pivotal role in fulfilling tier 0 - 3 network requirements, leveraging packet capture, encrypted traffic analysis and user behavior insights, cloud and network flow logs, SNMP, and centralized access. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>214</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3cdc7309-7bc3-4471-b0f4-7a6623ce5ae3</guid>
      <title>Mission First Podcast Series: Understanding the Framework of Multi-Cloud Economics</title>
      <description><![CDATA[When agencies/organizations understand cloud economics of cloud computing, they can optimize their investments and obtain the greatest value for the warfighter and addressing mission needs. Listen to hear Keith Nakasone, Senior Transformation Strategist of the Public Sector at VMware discuss cloud economics with VMware VP, Yvette Edwards.  
]]></description>
      <pubDate>Tue, 1 Aug 2023 15:16:23 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-podcast-series-understanding-the-framework-of-multi-cloud-economics-P6hChoM7</link>
      <enclosure length="12459410" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/07e3579d-c65d-4b7a-988f-53a94f361669/audio/d1732185-5e67-40ab-8b01-032e809073ce/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First Podcast Series: Understanding the Framework of Multi-Cloud Economics</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:12:24</itunes:duration>
      <itunes:summary>When agencies/organizations understand cloud economics of cloud computing, they can optimize their investments and obtain the greatest value for the warfighter and addressing mission needs. Listen to hear Keith Nakasone, Senior Transformation Strategist of the Public Sector at VMware discuss cloud economics with VMware VP, Yvette Edwards. </itunes:summary>
      <itunes:subtitle>When agencies/organizations understand cloud economics of cloud computing, they can optimize their investments and obtain the greatest value for the warfighter and addressing mission needs. Listen to hear Keith Nakasone, Senior Transformation Strategist of the Public Sector at VMware discuss cloud economics with VMware VP, Yvette Edwards. </itunes:subtitle>
      <itunes:keywords>workforce, computer, software, total cost, economics, cloud, government, prem, zero trust, process, move, discussion, technology, tech, talk, building, great, it, yvette, vmware, government agencies, fedramp, cybersecurity, vmware cloud, migrate, realize</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>213</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0059bd13-3921-4239-b4df-06241462602b</guid>
      <title>Why SSL/TLS Certificate Management Matters in 2023</title>
      <description><![CDATA[In this podcast, Jen Racine, Director of Sales Consulting at Entrust, and Andrew Sheedy, Enterprise Sales Director at Entrust, discuss the importance of managing SSL/TLS certificates and how agencies can maintain TLS encryption with Entrust Certificate Services (ECS). Listen to the podcast to discover how Entrust ECS can support your organization with SSL/TLS management to secure online communication, meet compliance requirements, advance Zero Trust initiatives and much more. 
]]></description>
      <pubDate>Mon, 17 Jul 2023 18:12:07 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Entrust, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/why-ssl-tls-certificate-management-matters-in-2023-js_eZrzR</link>
      <enclosure length="50082426" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/015462d7-8228-405f-9023-225f79510992/audio/8bdaefbb-2e6d-4e2c-8cfc-a800da1d0668/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Why SSL/TLS Certificate Management Matters in 2023</itunes:title>
      <itunes:author>Entrust, Carahsoft</itunes:author>
      <itunes:duration>00:52:08</itunes:duration>
      <itunes:summary>In this podcast, Jen Racine, Director of Sales Consulting at Entrust, and Andrew Sheedy, Enterprise Sales Director at Entrust, discuss the importance of managing SSL/TLS certificates and how agencies can maintain TLS encryption with Entrust Certificate Services (ECS). Listen to the podcast to discover how Entrust ECS can support your organization with SSL/TLS management to secure online communication, meet compliance requirements, advance Zero Trust initiatives and much more.</itunes:summary>
      <itunes:subtitle>In this podcast, Jen Racine, Director of Sales Consulting at Entrust, and Andrew Sheedy, Enterprise Sales Director at Entrust, discuss the importance of managing SSL/TLS certificates and how agencies can maintain TLS encryption with Entrust Certificate Services (ECS). Listen to the podcast to discover how Entrust ECS can support your organization with SSL/TLS management to secure online communication, meet compliance requirements, advance Zero Trust initiatives and much more.</itunes:subtitle>
      <itunes:keywords>government it certifications, pki, server, ssl, manage, browser, organization, trust, encryption protocols, algorithm, software, public, government certificates, ciphers, cloud, secure communication, ssl certificate check, government, zero trust, what is ssl certificate how does it work, cases, entrust certification authority, entrust ssl certificate, intel, issued, how does ssl encryption work, ssl server test, how do ssl certificates work, it, public sector, public key infrastructure (pki), transport layer security, ssl certificates, ssl certificate monitoring, certificate, entrust, important, entrust certificate services, ssl certificate management tool, management, ssl certificate validation, digital certificates, ca, year, cybersecurity, ssl certificate management, message authentication</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>212</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c756a80-08f5-4064-a5ec-dfabc54b03bb</guid>
      <title>A Bourbon Talk: Episode 3 (Tech Tasting Storytelling Podcast Series)</title>
      <description><![CDATA[A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. For today’s topic, our special guests are Matt Molloy, (Director, Mission Management Office at Dell Technologies), Birago Jones (CEO at Pienso),and Sam O’Daniel (Vice President of Civilian Accounts at TVAR Solutions . And we will spend time talking about new developments in Generative AI. 
]]></description>
      <pubDate>Thu, 6 Jul 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bourbon-tech-a-bourbon-talk-tech-tasting-storytelling-podcast-series-QwQh0M0D</link>
      <enclosure length="20592372" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7afbcc4c-fa00-4d48-9a81-5a4460e7da7d/audio/f0b4840b-1a7e-4386-a426-e41fbb380af9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A Bourbon Talk: Episode 3 (Tech Tasting Storytelling Podcast Series)</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:21:26</itunes:duration>
      <itunes:summary>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. For today’s topic, our special guests are Matt Molloy, (Director, Mission Management Office at Dell Technologies), Birago Jones (CEO at Pienso),and Sam O’Daniel (Vice President of Civilian Accounts at TVAR Solutions . And we will spend time talking about new developments in Generative AI.</itunes:summary>
      <itunes:subtitle>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. For today’s topic, our special guests are Matt Molloy, (Director, Mission Management Office at Dell Technologies), Birago Jones (CEO at Pienso),and Sam O’Daniel (Vice President of Civilian Accounts at TVAR Solutions . And we will spend time talking about new developments in Generative AI.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>211</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5c1fac0e-e17c-4366-b8bd-0918ee84eb89</guid>
      <title>The Role of Proactive Threat Hunting in a Zero Trust Strategy: a practitioner&apos;s point of view</title>
      <description><![CDATA[Listen to the CarahCast to discover how CrowdStrike protects public sector networks & assets by proactively responding to cyber threats. Enable zero trust now. 
]]></description>
      <pubDate>Fri, 30 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-role-of-proactive-threat-hunting-in-a-zero-trust-strategy-a-practitioners-point-of-view-ryjwtZXS</link>
      <enclosure length="39204590" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1beaeef1-9a04-4fb7-abb4-24edb019f1c5/audio/b3219f9e-d8e9-4686-ba6b-cddd09de5bd9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Role of Proactive Threat Hunting in a Zero Trust Strategy: a practitioner&apos;s point of view</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:40:48</itunes:duration>
      <itunes:summary>Listen to the CarahCast to discover how CrowdStrike protects public sector networks &amp; assets by proactively responding to cyber threats. Enable zero trust now.</itunes:summary>
      <itunes:subtitle>Listen to the CarahCast to discover how CrowdStrike protects public sector networks &amp; assets by proactively responding to cyber threats. Enable zero trust now.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>210</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aa771381-1ffd-46d3-8268-382d67a0ac42</guid>
      <title>Mission First S2 Ep.3: Secure, Operate, and Maintain Infrastructure</title>
      <description><![CDATA[<p>Tune in to Season 2, Episode 3  of our podcast series to hear from Elizabeth Cappello, <i>Deputy Chief Information Officer (CIO)</i> for the Department of Homeland Security (DHS), and Craig Bowman, <i>Senior Director - Federal</i> for VMware, who will discuss:</p><ul><li>Meaningful implementation of artificial intelligence in cybersecurity</li><li>How to view open standards versus purpose-built solutions</li><li>Finding a balance between security and user experience</li></ul>
]]></description>
      <pubDate>Wed, 21 Jun 2023 15:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Beth Cappello, Carahsoft, Corey Baumgartner, VMware, Craig Bowman)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-s2-ep3-secure-operate-and-maintain-infrastructure-gpkcsZlE</link>
      <content:encoded><![CDATA[<p>Tune in to Season 2, Episode 3  of our podcast series to hear from Elizabeth Cappello, <i>Deputy Chief Information Officer (CIO)</i> for the Department of Homeland Security (DHS), and Craig Bowman, <i>Senior Director - Federal</i> for VMware, who will discuss:</p><ul><li>Meaningful implementation of artificial intelligence in cybersecurity</li><li>How to view open standards versus purpose-built solutions</li><li>Finding a balance between security and user experience</li></ul>
]]></content:encoded>
      <enclosure length="37434234" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6fba6ccf-dce7-4c3a-886b-f3e20bc2e2fa/audio/fe19d70d-b23b-4952-8e4d-a121a5913764/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First S2 Ep.3: Secure, Operate, and Maintain Infrastructure</itunes:title>
      <itunes:author>Beth Cappello, Carahsoft, Corey Baumgartner, VMware, Craig Bowman</itunes:author>
      <itunes:duration>00:38:12</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>open standards, mission first, user experience, artificial intelligence, public sector, cybersecurity, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>202</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eb4c79c2-b027-49e4-9951-887ef91cbaa6</guid>
      <title>Cyber-Insurance vs. Self-Insurance - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cyber-insurance-vs-self-insurance-public-sector-day-2023-QV1ZNOGy</link>
      <enclosure length="29453965" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/24835406-97a5-42db-bc8a-e3ad9966607c/audio/1a108c91-d788-427d-b566-9d56e4ecee5b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cyber-Insurance vs. Self-Insurance - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:30:40</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>206</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6636636a-7974-469a-b277-e8bf5e1c85bf</guid>
      <title>Keynote Address - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/keynote-address-public-sector-day-2023-5PealGTA</link>
      <enclosure length="35955748" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/303160db-1ab3-4b77-9712-cfcd03736d21/audio/02a9b4bf-4ccf-418f-b2df-26a67d9303fd/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Keynote Address - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:37:26</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>209</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">84df736e-9ba7-4a1e-a36b-85aeed33c9a9</guid>
      <title>3rd Party Risk Management (State &amp; Local) - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/3rd-party-risk-management-state-local-public-sector-day-2023-98bpP6XI</link>
      <enclosure length="25684397" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/89398c6b-3e60-4be2-9d9d-067e63d3968c/audio/2988ee3e-6ee0-4a2e-94b6-f03107de9356/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>3rd Party Risk Management (State &amp; Local) - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:26:44</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>208</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">09f533eb-ce5b-4b4c-8094-9b6ac511659b</guid>
      <title>Zero Trust (State &amp; Local) - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting.

Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today. 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/zero-trust-state-local-public-sector-day-2023-noX1Ga1P</link>
      <enclosure length="32924254" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/95ff4c87-dce6-40f5-8077-ba8c689928ae/audio/3a395e61-5c6a-4d83-ad5e-ae4ff809a899/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Zero Trust (State &amp; Local) - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:34:17</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting.

Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today.</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting.

Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>207</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7276db39-5ab2-4b45-9c3d-1ac15284e491</guid>
      <title>3rd Party Risk Management (Federal) - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/3rd-party-risk-management-federal-public-sector-day-2023-__x2bHtD</link>
      <enclosure length="17491145" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/33e9eca1-5b8f-4ab6-b0bc-4f69c3ea1b47/audio/83066e4e-35a7-4fc9-a88e-ec3a874861c8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>3rd Party Risk Management (Federal) - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:18:12</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>205</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1978a7a8-c7f8-4840-8502-8d2fb6853bf6</guid>
      <title>Zero Trust (Federal) - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/zero-trust-federal-public-sector-day-2023-MJYUsx3N</link>
      <enclosure length="16003730" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8bf1fd56-6697-4076-b251-623a99e2c71f/audio/e3401f37-0c85-4e7b-a104-988a74dee0bb/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Zero Trust (Federal) - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:16:39</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>203</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1e1970ee-5244-4632-a3b7-a3a9381bf470</guid>
      <title>Software Supply Chain &amp; Executive Order 14028 - Public Sector Day 2023</title>
      <description><![CDATA[Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today 
]]></description>
      <pubDate>Thu, 8 Jun 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/software-supply-chain-executive-order-14028-public-sector-day-2023-kBldlO80</link>
      <enclosure length="28508223" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9a96ef34-83f0-44e0-aa4e-dbac564d1f76/audio/c6cbc56e-c7ae-4b9a-bef4-8f28c903bfc9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Software Supply Chain &amp; Executive Order 14028 - Public Sector Day 2023</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:29:41</itunes:duration>
      <itunes:summary>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:summary>
      <itunes:subtitle>Check out this podcast series to learn from government IT luminaries and industry executives as they share their experiences tackling the toughest challenges you face, from the cloud and the supply chain to ransomware and recruiting. Whether you are with a federal agency or a city, county, or state government, in the US or abroad, you will benefit from this deep dive into issues of vital interest to the public sector today</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>204</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">df8b2fb2-9633-4da0-b4a2-2aa5a16c3267</guid>
      <title>Implementing Zero Trust: Government Experts Explain How to Help Satisfy Federal Mandates with Juniper Networks</title>
      <description><![CDATA[Chuck Brooks, President of Brooks Consulting International , Aaron Bishop, CISO Air Force & Spaceforce , Scott Davis, CISO and Executive Director of Cybersecurity US DHS Customs and Border protection, Mitch Herckis, Acting Director of the Office of the Federal CIO, Executive office of the President, Elizabeth Schweinsberg, Digital Service Expert at US Digital Service,  
will discuss how organizations can implement zero trust to satisfy federal mandates.
 
]]></description>
      <pubDate>Mon, 5 Jun 2023 20:24:52 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Juniper Networks, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/implementing-zero-trust-government-experts-explain-how-to-help-satisfy-federal-mandates-with-juniper-networks-wlGhiOpY</link>
      <enclosure length="51986909" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/576862f3-006d-4d67-8222-c6f9377726ce/audio/1eb8f2db-eee8-49c0-8666-70aafc5ea581/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Implementing Zero Trust: Government Experts Explain How to Help Satisfy Federal Mandates with Juniper Networks</itunes:title>
      <itunes:author>Juniper Networks, Carahsoft</itunes:author>
      <itunes:duration>00:53:57</itunes:duration>
      <itunes:summary>Chuck Brooks, President of Brooks Consulting International , Aaron Bishop, CISO Air Force &amp; Spaceforce , Scott Davis, CISO and Executive Director of Cybersecurity US DHS Customs and Border protection, Mitch Herckis, Acting Director of the Office of the Federal CIO, Executive office of the President, Elizabeth Schweinsberg, Digital Service Expert at US Digital Service,  
will discuss how organizations can implement zero trust to satisfy federal mandates.
</itunes:summary>
      <itunes:subtitle>Chuck Brooks, President of Brooks Consulting International , Aaron Bishop, CISO Air Force &amp; Spaceforce , Scott Davis, CISO and Executive Director of Cybersecurity US DHS Customs and Border protection, Mitch Herckis, Acting Director of the Office of the Federal CIO, Executive office of the President, Elizabeth Schweinsberg, Digital Service Expert at US Digital Service,  
will discuss how organizations can implement zero trust to satisfy federal mandates.
</itunes:subtitle>
      <itunes:keywords>trust, talking, software, network, years, quantum, government, prem, zero trust, move, technology, intel, agencies, challenges, dod, cbp, scott, cybersecurity, mitch, ransomware, security, perspective, computers, people, work</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>201</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02f2d658-8316-4bbc-afb4-7f126d5fefda</guid>
      <title>Federal Resilience through Enhanced Governance: Next-Generation Software Access Controls for FISMA, Zero Trust, and CDM Integration</title>
      <description><![CDATA[In this podcast, you will learn how PC Matic's multi-patented allowlisting technology has solved the historical governance issues that have plagued traditional allowlisting products, for Federal agencies looking to fulfill the SWAM requirement within the Continuous Diagnostics & Mitigation program.

In Carahsoft’s new podcast, Fulfilling SWAM Compliance in the CDM Program Through Application Allowlisting, Zack Austin, PC Matic's Vice President of Business Development will demonstrate the value their solution brings in regards to simplifying implementation and management of the default-deny method. We’ll also have Will Crenshaw - President CyberPrime, discussing CDM and the progress made across the Federal Government.

SUBSCRIBE to get the latest tech tips & tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community
 
]]></description>
      <pubDate>Mon, 5 Jun 2023 19:01:58 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Zack Austin, Willie Crenshaw)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/fulfilling-swam-compliance-in-the-cdm-program-through-application-allowlisting-HlKvg6UO</link>
      <enclosure length="53058684" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/de296471-0cf1-4cfb-8d21-a1000f1a5a96/audio/a4b72449-ef91-458d-8b1d-85eadbdbe4dc/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Federal Resilience through Enhanced Governance: Next-Generation Software Access Controls for FISMA, Zero Trust, and CDM Integration</itunes:title>
      <itunes:author>Zack Austin, Willie Crenshaw</itunes:author>
      <itunes:duration>00:55:15</itunes:duration>
      <itunes:summary>In this podcast, you will learn how PC Matic&apos;s multi-patented allowlisting technology has solved the historical governance issues that have plagued traditional allowlisting products, for Federal agencies looking to fulfill the SWAM requirement within the Continuous Diagnostics &amp; Mitigation program.

In Carahsoft’s new podcast, Fulfilling SWAM Compliance in the CDM Program Through Application Allowlisting, Zack Austin, PC Matic&apos;s Vice President of Business Development will demonstrate the value their solution brings in regards to simplifying implementation and management of the default-deny method. We’ll also have Will Crenshaw - President CyberPrime, discussing CDM and the progress made across the Federal Government.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community
</itunes:summary>
      <itunes:subtitle>In this podcast, you will learn how PC Matic&apos;s multi-patented allowlisting technology has solved the historical governance issues that have plagued traditional allowlisting products, for Federal agencies looking to fulfill the SWAM requirement within the Continuous Diagnostics &amp; Mitigation program.

In Carahsoft’s new podcast, Fulfilling SWAM Compliance in the CDM Program Through Application Allowlisting, Zack Austin, PC Matic&apos;s Vice President of Business Development will demonstrate the value their solution brings in regards to simplifying implementation and management of the default-deny method. We’ll also have Will Crenshaw - President CyberPrime, discussing CDM and the progress made across the Federal Government.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv
FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft
CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/
LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft
LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast
READ THE LATEST TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>200</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">24b39c11-c980-46d2-8517-645528725539</guid>
      <title>How the Technical Community Can Assist the Government to Satisfy Federal Mandates with Zero Trust with Juniper Networks</title>
      <description><![CDATA[Chuck Brooks, President of Brooks Consulting International Shawn Wells, Managing Director for Cybersecurity Strategy and Technology at Accenture Federal Services Gregory Garrett, VP Cybersecurity at Peraton Herb Kelsey, Federal CTO at Dell Technologies Eric Schlesinger, Operations & Engineering VP, Cyber Security at Parsons Tom Van Meter, Senior SE Director at Juniper Networks will discuss how organizations can satisfy federal safety mandates with zero trust. 
]]></description>
      <pubDate>Mon, 5 Jun 2023 18:48:41 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Juniper Networks, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-the-technical-community-can-assist-the-government-to-satisfy-federal-mandates-with-zero-trust-Lltwvwwk</link>
      <enclosure length="38301241" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/19a75b3c-ee70-4b6d-b2b3-b9e049be8acc/audio/f49da0db-a90f-4d83-9a20-56ce7a02e27d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How the Technical Community Can Assist the Government to Satisfy Federal Mandates with Zero Trust with Juniper Networks</itunes:title>
      <itunes:author>Juniper Networks, Carahsoft</itunes:author>
      <itunes:duration>00:39:52</itunes:duration>
      <itunes:summary>Chuck Brooks, President of Brooks Consulting International Shawn Wells, Managing Director for Cybersecurity Strategy and Technology at Accenture Federal Services Gregory Garrett, VP Cybersecurity at Peraton Herb Kelsey, Federal CTO at Dell Technologies Eric Schlesinger, Operations &amp; Engineering VP, Cyber Security at Parsons Tom Van Meter, Senior SE Director at Juniper Networks will discuss how organizations can satisfy federal safety mandates with zero trust.</itunes:summary>
      <itunes:subtitle>Chuck Brooks, President of Brooks Consulting International Shawn Wells, Managing Director for Cybersecurity Strategy and Technology at Accenture Federal Services Gregory Garrett, VP Cybersecurity at Peraton Herb Kelsey, Federal CTO at Dell Technologies Eric Schlesinger, Operations &amp; Engineering VP, Cyber Security at Parsons Tom Van Meter, Senior SE Director at Juniper Networks will discuss how organizations can satisfy federal safety mandates with zero trust.</itunes:subtitle>
      <itunes:keywords>give, trust, software, network, government, zero trust, technology, implement, strategy, intel, data, cyber, agencies, federal, shawn, nist, tom, dod, gregory, perimeter, cio, cybersecurity, ransomware, security, computers, people, work</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>200</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a80d04d8-c9ee-457a-9ab2-d952cbedca11</guid>
      <title>Fireside Chat: Transforming Technology in Government</title>
      <description><![CDATA[The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four "wildly important goals." Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction. 
]]></description>
      <pubDate>Wed, 31 May 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/fireside-chat-transforming-technology-in-government-xa_zQq7Q</link>
      <enclosure length="54030129" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/2b8af760-3ebe-4f51-b466-742d160459a5/audio/e2c930b2-7223-4476-b1bb-bfb77462b821/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Fireside Chat: Transforming Technology in Government</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:56:03</itunes:duration>
      <itunes:summary>The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four &quot;wildly important goals.&quot; Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction.</itunes:summary>
      <itunes:subtitle>The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four &quot;wildly important goals.&quot; Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>197</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c6bb46a-780a-4ba8-9f87-69debd6ecdce</guid>
      <title>Combating Cyber Threats in Government with Okta</title>
      <description><![CDATA[The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four "wildly important goals." Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction. 
]]></description>
      <pubDate>Wed, 31 May 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Okta, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/combating-cyber-threats-in-government-with-okta-jqzfleew-Wb_LwB6i</link>
      <enclosure length="49112413" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/328f4073-aa8a-4fdb-a0f4-78bd594595dd/audio/a1b11aed-a39e-42a8-bd5b-0b418ffccbb5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Combating Cyber Threats in Government with Okta</itunes:title>
      <itunes:author>Okta, Carahsoft</itunes:author>
      <itunes:duration>00:50:56</itunes:duration>
      <itunes:summary>The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four &quot;wildly important goals.&quot; Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction.</itunes:summary>
      <itunes:subtitle>The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four &quot;wildly important goals.&quot; Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>199</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">18853a17-96ee-46a0-8112-8c34fb216f49</guid>
      <title>The Role of Emerging Technologies in Digital Government with Rubrik</title>
      <description><![CDATA[The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four "wildly important goals." Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction. 
]]></description>
      <pubDate>Wed, 31 May 2023 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Rubrik, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-role-of-emerging-technologies-in-digital-government-with-rubrik-h3bB0JQW</link>
      <enclosure length="57038206" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fe02f670-5104-43a2-b9d2-e54a854127a2/audio/c63877a2-8398-4a75-b318-d9a3b0b587bc/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Role of Emerging Technologies in Digital Government with Rubrik</itunes:title>
      <itunes:author>Rubrik, Carahsoft</itunes:author>
      <itunes:duration>00:59:11</itunes:duration>
      <itunes:summary>The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four &quot;wildly important goals.&quot; Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction.</itunes:summary>
      <itunes:subtitle>The state of Colorado is undertaking a top-to-bottom modernization of its IT infrastructure, aimed at achieving what the Governor’s Office of Information Technology describes as four &quot;wildly important goals.&quot; Four major initiatives (tech transformation, broadband access, digital government services, and enhanced employee engagement) are intended to deliver more and better digital services that improve residents’ lives and increase government employees’ job satisfaction.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>198</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ade0066f-bfa3-4a99-95f8-6c786710c8e8</guid>
      <title>Mission First S2 Ep.2: Organizational Transformation: Culture, Teams &amp; Leading Through Change</title>
      <description><![CDATA[<p>Tune in to Season 2, Episode 2 of our podcast series to hear from Jamie Holcombe, <i>Chief Information Officer (CIO)</i> for the United States Patent and Trademark Office (USPTO) and Jennifer Chang, <i>Senior Director, Federal Civilian </i>for VMware, who will discuss:</p><ul><li>Driving cultural changes across an organization</li><li>Implementing the NWOW (New Ways of Working) program and how it can work for you</li><li>The challenges behind recruiting and retaining great talent in the Federal Government</li><li>How to lead by leaning forward, minimizing complacency, creating a sense of urgency, and driving growth</li></ul>
]]></description>
      <pubDate>Wed, 24 May 2023 15:30:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Jennifer Chang, Jamie Holcombe, Corey Baumgartner, VMware, Carahsoft, Craig Bowman)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-s2-ep2-organizational-transformation-culture-teams-leading-through-change-L1Ws2703</link>
      <content:encoded><![CDATA[<p>Tune in to Season 2, Episode 2 of our podcast series to hear from Jamie Holcombe, <i>Chief Information Officer (CIO)</i> for the United States Patent and Trademark Office (USPTO) and Jennifer Chang, <i>Senior Director, Federal Civilian </i>for VMware, who will discuss:</p><ul><li>Driving cultural changes across an organization</li><li>Implementing the NWOW (New Ways of Working) program and how it can work for you</li><li>The challenges behind recruiting and retaining great talent in the Federal Government</li><li>How to lead by leaning forward, minimizing complacency, creating a sense of urgency, and driving growth</li></ul>
]]></content:encoded>
      <enclosure length="37336524" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/35ecf9fd-f112-4c0a-8cfa-f25e0f5feafb/audio/ec3b0ae4-a963-45b7-9c93-6c9fa645348b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First S2 Ep.2: Organizational Transformation: Culture, Teams &amp; Leading Through Change</itunes:title>
      <itunes:author>Jennifer Chang, Jamie Holcombe, Corey Baumgartner, VMware, Carahsoft, Craig Bowman</itunes:author>
      <itunes:duration>00:38:17</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>federal government, mission first, growth, recruiting, federal civilian, uspto, nwow</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>201</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">415768a0-b515-45da-a659-1d314cc1b2a5</guid>
      <title>A Bourbon Talk: Episode 1 (Tech Tasting Storytelling Podcast Series)</title>
      <description><![CDATA[A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. For today’s topic, our special guest is Herb Kelsey, Dell Technologies Security Strategy Program Lead from Office of the CTO. And we will spend time on Herb’s favorite topic “Zero Trust." 
]]></description>
      <pubDate>Sat, 20 May 2023 16:24:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (FedData, Dell Technologies, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bourbon-tech-zero-trust-simplified-2n7KhIWd</link>
      <enclosure length="21906681" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/39de6d3d-b691-40db-b5a4-c6433c60b621/audio/8fdeee10-51f8-429f-9a23-242fc113a69d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A Bourbon Talk: Episode 1 (Tech Tasting Storytelling Podcast Series)</itunes:title>
      <itunes:author>FedData, Dell Technologies, Carahsoft</itunes:author>
      <itunes:duration>00:22:34</itunes:duration>
      <itunes:summary>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. For today’s topic, our special guest is Herb Kelsey, Dell Technologies Security Strategy Program Lead from Office of the CTO. And we will spend time on Herb’s favorite topic “Zero Trust.&quot;</itunes:summary>
      <itunes:subtitle>A podcast series centered around important and innovative technology topics through a new and fresh lens creating an easy digest format for very complex technology. For today’s topic, our special guest is Herb Kelsey, Dell Technologies Security Strategy Program Lead from Office of the CTO. And we will spend time on Herb’s favorite topic “Zero Trust.&quot;</itunes:subtitle>
      <itunes:keywords>carahsoft, part, virus, dell, aged, build, software, partners, years, mobile command center, government, cyber attack, today, zero trust, technology, ransom, cisa, tech, malware, cyber, bourbon, attacks, dell technologies, feddata, largest companies, tasting, cybersecurity, podcast, matured, ransomware, rick</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>196</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">58d6192e-c142-49cc-b8f8-aa8cb66fff9f</guid>
      <title>Mission First S2 Ep.1: The Key to Approaching State &amp; Local Government</title>
      <description><![CDATA[<p>Tune in to Season 2, Episode 1 of our Mission First podcast to hear Mike Dent, Chief Information Cyber Security and Privacy Officer for Fairfax County Government and Craig Bowman, Senior Director – Federal at VMware discuss: </p><ul><li>How their move to the cloud is shifting their perspectives on security </li><li>Adapting security around edge computing as increased workloads are pushed to the edge</li><li>Strategic ways technology leaders can approach State and Local officials</li></ul>
]]></description>
      <pubDate>Wed, 19 Apr 2023 15:51:12 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Mike Dent, Corey Baumgartner, VMware, Carahsoft, Craig Bowman)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-s2-ep1-the-key-to-approaching-state-local-government-ic773efI</link>
      <content:encoded><![CDATA[<p>Tune in to Season 2, Episode 1 of our Mission First podcast to hear Mike Dent, Chief Information Cyber Security and Privacy Officer for Fairfax County Government and Craig Bowman, Senior Director – Federal at VMware discuss: </p><ul><li>How their move to the cloud is shifting their perspectives on security </li><li>Adapting security around edge computing as increased workloads are pushed to the edge</li><li>Strategic ways technology leaders can approach State and Local officials</li></ul>
]]></content:encoded>
      <enclosure length="44409974" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1e0d1282-7f17-4960-a86c-b80f9cf76928/audio/ebf98762-72d9-44e0-b30c-2e24bbcb30b9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First S2 Ep.1: The Key to Approaching State &amp; Local Government</itunes:title>
      <itunes:author>Mike Dent, Corey Baumgartner, VMware, Carahsoft, Craig Bowman</itunes:author>
      <itunes:duration>00:44:21</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>machine learning, software, cloud, mission first, state &amp; local, government, technology leaders, fairfax county government, public sector, hardware, federal, security, edge computing, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>195</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ecb3d3ca-ed1a-4165-af55-ae3b99d0036f</guid>
      <title>Deliver Identity Protection with CrowdStrike</title>
      <description><![CDATA[In this podcast, Ned Miller, CrowdStrike Federal VP, and Andrew Harris, CrowdStrike’s Sr Director of Global Public Sector’s Technical Strategy, discuss how zero trust identity protection solutions help the public sector prevent data fabric breaches and reinforce legacy authentication protocols.  
]]></description>
      <pubDate>Mon, 10 Apr 2023 13:30:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (CrowdStrike, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/deliver-identity-protection-crowdstrike-PknWwVf_</link>
      <enclosure length="19035086" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/29ed3fb8-1a5a-4fef-adb1-8be003b96453/audio/528fd4ff-66e8-4393-9c00-03ae35fb86f8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Deliver Identity Protection with CrowdStrike</itunes:title>
      <itunes:author>CrowdStrike, Carahsoft</itunes:author>
      <itunes:duration>00:19:47</itunes:duration>
      <itunes:summary>In this podcast, Ned Miller, CrowdStrike Federal VP, and Andrew Harris, CrowdStrike’s Sr Director of Global Public Sector’s Technical Strategy, discuss how zero trust identity protection solutions help the public sector prevent data fabric breaches and reinforce legacy authentication protocols. </itunes:summary>
      <itunes:subtitle>In this podcast, Ned Miller, CrowdStrike Federal VP, and Andrew Harris, CrowdStrike’s Sr Director of Global Public Sector’s Technical Strategy, discuss how zero trust identity protection solutions help the public sector prevent data fabric breaches and reinforce legacy authentication protocols. </itunes:subtitle>
      <itunes:keywords>customers, identity protection, trust, network breach prevention, software, premises, tech podcast, account, ned, cloud, ecosystem, logging, question, government, conditional access, technology, icam, cloud native platform, protection, data fabric solutions, credentials, cyber, application, identity, multi factor authentication, it, zero trust strategy, public sector, global threat report, federal, legacy authentication protocols, identity providers, active directory, crowdstrike, vendors, risk score calculator, cybersecurity, andrew, capabilities</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>194</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">efd007b3-e186-46ae-b5a0-135c387de78c</guid>
      <title>Optimize Enterprise Service Management with Atlassian | Carahsoft</title>
      <description><![CDATA[In this podcast, Mike Downard, President of Silicon Mountain, and Kevin Howard, Sales Manager at Carahsoft, discuss how nontechnical teams are embracing digital practices like enterprise service management (ESM) solutions through Atlassian's Jira Service Management tool to enhance daily workflow.   
]]></description>
      <pubDate>Wed, 22 Mar 2023 20:30:24 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/optimize-enterprise-service-management-with-atlassian-carahsoft-6x6sPJn6</link>
      <enclosure length="19072617" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b6822a0b-b2c0-45ef-9511-a45cb2ed04a6/audio/0ffddc5b-a0d9-407f-934d-9505641fd2be/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Optimize Enterprise Service Management with Atlassian | Carahsoft</itunes:title>
      <itunes:author>Atlassian, Carahsoft</itunes:author>
      <itunes:duration>00:19:50</itunes:duration>
      <itunes:summary>In this podcast, Mike Downard, President of Silicon Mountain, and Kevin Howard, Sales Manager at Carahsoft, discuss how nontechnical teams are embracing digital practices like enterprise service management (ESM) solutions through Atlassian&apos;s Jira Service Management tool to enhance daily workflow.  </itunes:summary>
      <itunes:subtitle>In this podcast, Mike Downard, President of Silicon Mountain, and Kevin Howard, Sales Manager at Carahsoft, discuss how nontechnical teams are embracing digital practices like enterprise service management (ESM) solutions through Atlassian&apos;s Jira Service Management tool to enhance daily workflow.  </itunes:subtitle>
      <itunes:keywords>problem, atlassian, system, enterprise service management, build, workflow optimization, solution, itsm, transparency, cross-team collaboration, cloud, silicon, it service management, government, process, technology, tools, jira service management, cyber, esm, it, public sector, mike, steps, knowledge management, point, it service delivery, workflow, teams, information, workflow bottlenecks, exploring, email, cybersecurity, folks, people</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>193</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">44cd50c1-5c14-457b-bca2-04ca73ade6a1</guid>
      <title>Strengthen Your Cybersecurity Insurance Strategy with Mimecast</title>
      <description><![CDATA[Insurance premiums for cyber coverage have significantly increased after a string of high-profile attacks and record setting ransomware numbers. Learn how your organization can utilize Mimecast to strengthen its cybersecurity. 
]]></description>
      <pubDate>Fri, 10 Mar 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/strengthen-your-cybersecurity-insurance-strategy-with-mimecast-YAwxPORV</link>
      <enclosure length="39257265" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9aeefee3-cfe1-4424-a4f5-161f28a19c46/audio/06aa314c-d5f1-4af5-bed5-ef3482049ac8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Strengthen Your Cybersecurity Insurance Strategy with Mimecast</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:40:53</itunes:duration>
      <itunes:summary>Insurance premiums for cyber coverage have significantly increased after a string of high-profile attacks and record setting ransomware numbers. Learn how your organization can utilize Mimecast to strengthen its cybersecurity.</itunes:summary>
      <itunes:subtitle>Insurance premiums for cyber coverage have significantly increased after a string of high-profile attacks and record setting ransomware numbers. Learn how your organization can utilize Mimecast to strengthen its cybersecurity.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>192</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce4f228f-65b8-4cfe-ae18-feb755755535</guid>
      <title>Combating Cyber Threats in Government with Okta</title>
      <description><![CDATA[Federal, state, and local agencies stand together in the fight to prevent and recover from cyberattacks, as their communities increasingly become targets of hackers and other cyber criminals. Cybersecurity risks range from data exploitation; insider threats; third-party practices as outsourcing increases; ransomware; identity theft; and fraudulent access to state government services. 
]]></description>
      <pubDate>Fri, 3 Mar 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (okta, carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/combating-cyber-threats-in-government-with-okta-oKveX41J</link>
      <enclosure length="56521532" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5861048d-d955-4b11-aa54-71fea60c6da1/audio/8668b357-dcc8-40a4-8059-2f90d1b77c0f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Combating Cyber Threats in Government with Okta</itunes:title>
      <itunes:author>okta, carahsoft</itunes:author>
      <itunes:duration>00:58:52</itunes:duration>
      <itunes:summary>Federal, state, and local agencies stand together in the fight to prevent and recover from cyberattacks, as their communities increasingly become targets of hackers and other cyber criminals. Cybersecurity risks range from data exploitation; insider threats; third-party practices as outsourcing increases; ransomware; identity theft; and fraudulent access to state government services.</itunes:summary>
      <itunes:subtitle>Federal, state, and local agencies stand together in the fight to prevent and recover from cyberattacks, as their communities increasingly become targets of hackers and other cyber criminals. Cybersecurity risks range from data exploitation; insider threats; third-party practices as outsourcing increases; ransomware; identity theft; and fraudulent access to state government services.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>190</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3eb6614b-0120-4f08-851b-318af83f4d4b</guid>
      <title>The Roadmap to Emergency Response through Technology with Zoom</title>
      <description><![CDATA[Americans’ health, security, and economic wellbeing are tied to climate and weather. In a state that often faces natural disasters such as hurricanes and flooding, recovery depends on fast, secure IT resources to match manpower and machinery with the locations most in need, while delivering fast and secure assistance to victims. 
]]></description>
      <pubDate>Fri, 3 Mar 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-roadmap-to-emergency-response-through-technology-with-zoom-v3Lii2sM</link>
      <enclosure length="51313343" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8d3d3f0f-6337-4c56-880a-c776e699d481/audio/24dc2cd0-0a12-460f-987f-db621fc6ce76/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Roadmap to Emergency Response through Technology with Zoom</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:53:27</itunes:duration>
      <itunes:summary>Americans’ health, security, and economic wellbeing are tied to climate and weather. In a state that often faces natural disasters such as hurricanes and flooding, recovery depends on fast, secure IT resources to match manpower and machinery with the locations most in need, while delivering fast and secure assistance to victims.</itunes:summary>
      <itunes:subtitle>Americans’ health, security, and economic wellbeing are tied to climate and weather. In a state that often faces natural disasters such as hurricanes and flooding, recovery depends on fast, secure IT resources to match manpower and machinery with the locations most in need, while delivering fast and secure assistance to victims.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>191</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">010187c6-b109-4c2f-bf9f-eae0522effca</guid>
      <title>Leveraging Technology for Data-Driven Government with Fortinet</title>
      <description><![CDATA[The use of emerging and innovative technologies is transforming legacy systems to better respond to citizens and facilitate digital services. Using cloud-ready architectures, agile methods, and data interoperability, Florida is tapping top technology talent to redesign aging technology systems and deliver better outcomes for Floridians. 
]]></description>
      <pubDate>Fri, 3 Mar 2023 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/leveraging-technology-for-data-driven-government-with-fortinet-_PIvmIo5</link>
      <enclosure length="60350874" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6a93836b-1f78-4a93-a149-88e968d429a4/audio/bf70b528-4a14-47e8-924b-4727004f4cdb/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Leveraging Technology for Data-Driven Government with Fortinet</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>01:02:51</itunes:duration>
      <itunes:summary>The use of emerging and innovative technologies is transforming legacy systems to better respond to citizens and facilitate digital services. Using cloud-ready architectures, agile methods, and data interoperability, Florida is tapping top technology talent to redesign aging technology systems and deliver better outcomes for Floridians.</itunes:summary>
      <itunes:subtitle>The use of emerging and innovative technologies is transforming legacy systems to better respond to citizens and facilitate digital services. Using cloud-ready architectures, agile methods, and data interoperability, Florida is tapping top technology talent to redesign aging technology systems and deliver better outcomes for Floridians.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>189</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">03ff2eff-afd7-4b89-a7df-c20c96e10878</guid>
      <title>How Security Researchers Strengthen the DoD&apos;s Security with HackerOne</title>
      <description><![CDATA[Listen in to hear Corben Leo, a Security Researcher from the Hack U.S. program, discuss some of the results. In addition, you'll learn some key differences between VDPs and bug bounty programs to better understand what each program can do for your agency.

SUBSCRIBE to get the latest tech tips & tricks from industry leaders!
https://www.youtube.com/user/carahtechtv

FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft

CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/ 

LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft

LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast

READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community 
 
]]></description>
      <pubDate>Mon, 27 Feb 2023 22:12:57 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (HackerOne, vulnerability, bounty programs, bit, programs, hack, bug bounty, vulnerability disclosure, dod, bug bounty program, application, bounties, websites, scope, important, program, learn, vdp, misconceptions, people, it, software, hacking, ethical hacker, computers, cybersecurity, tech, technology, security, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-security-researchers-strengthen-the-dods-security-with-hackerone-vkAp1s6Q</link>
      <enclosure length="22289575" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/815b5677-f78b-4d1d-b687-2cbdcc4e6dd3/audio/bb7b6ae3-fe8c-4980-beb5-7285716f7529/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How Security Researchers Strengthen the DoD&apos;s Security with HackerOne</itunes:title>
      <itunes:author>HackerOne, vulnerability, bounty programs, bit, programs, hack, bug bounty, vulnerability disclosure, dod, bug bounty program, application, bounties, websites, scope, important, program, learn, vdp, misconceptions, people, it, software, hacking, ethical hacker, computers, cybersecurity, tech, technology, security, Carahsoft</itunes:author>
      <itunes:duration>00:23:10</itunes:duration>
      <itunes:summary>Listen in to hear Corben Leo, a Security Researcher from the Hack U.S. program, discuss some of the results. In addition, you&apos;ll learn some key differences between VDPs and bug bounty programs to better understand what each program can do for your agency.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv

FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft

CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/ 

LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft

LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast

READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community 
</itunes:summary>
      <itunes:subtitle>Listen in to hear Corben Leo, a Security Researcher from the Hack U.S. program, discuss some of the results. In addition, you&apos;ll learn some key differences between VDPs and bug bounty programs to better understand what each program can do for your agency.

SUBSCRIBE to get the latest tech tips &amp; tricks from industry leaders!
https://www.youtube.com/user/carahtechtv

FOLLOW US ON TWITTER:
https://twitter.com/Carahsoft

CONNECT WITH US ON LINKEDIN:
https://www.linkedin.com/company/carahsoft/ 

LIKE US ON FACEBOOK:
https://www.facebook.com/carahsoft

LISTEN TO US ON OUR CARAHCAST CHANNEL:
https://www.carahsoft.com/carahcast

READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS:
https://www.carahsoft.com/community 
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>188</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c6365d2a-c5eb-4a6c-ba9e-a9e603d9c69e</guid>
      <title>Modernizing ARUSD Security with SolarWinds Network Visibility Solutions | Official CarahCast</title>
      <description><![CDATA[Scott Pross, Vice President of Technology at Monalytic, a SolarWinds company, and Brett Littrell, Chief Technology Officer of Alum Rock Union School District, discuss real world solutions utilizing school district case studies. Learn how Alum Rock Union School District transformed their aging technical infrastructure into a modern network with SolarWinds to meet the needs of their students and staff.  
]]></description>
      <pubDate>Mon, 19 Dec 2022 20:28:47 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Brett Littrell, Scott Pross, Corey Baumgartner)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernizing-arusd-security-with-solarwinds-network-visibility-solutions-official-carahcast-F1HzjqHi</link>
      <enclosure length="43809321" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/47a30e92-acbf-4754-a2d2-638846da4e5a/audio/f43d7069-1b63-4d1e-87d1-becf69a39415/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernizing ARUSD Security with SolarWinds Network Visibility Solutions | Official CarahCast</itunes:title>
      <itunes:author>Brett Littrell, Scott Pross, Corey Baumgartner</itunes:author>
      <itunes:duration>00:45:38</itunes:duration>
      <itunes:summary>Scott Pross, Vice President of Technology at Monalytic, a SolarWinds company, and Brett Littrell, Chief Technology Officer of Alum Rock Union School District, discuss real world solutions utilizing school district case studies. Learn how Alum Rock Union School District transformed their aging technical infrastructure into a modern network with SolarWinds to meet the needs of their students and staff. </itunes:summary>
      <itunes:subtitle>Scott Pross, Vice President of Technology at Monalytic, a SolarWinds company, and Brett Littrell, Chief Technology Officer of Alum Rock Union School District, discuss real world solutions utilizing school district case studies. Learn how Alum Rock Union School District transformed their aging technical infrastructure into a modern network with SolarWinds to meet the needs of their students and staff. </itunes:subtitle>
      <itunes:keywords>solarwinds, public sector, arusd, technical infrastructure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>187</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ad507ea-62f0-4454-8da9-a994733e47e9</guid>
      <title>Cofense Q3 Phishing and Threat Intelligence Report</title>
      <description><![CDATA[In this episode, Nikhil Gupta, Core Cyber Demo Specialist at Carahsoft, is joined by Joseph Gallop, Cyber Threat Intelligence Manager, Practitioner at Cofense. Together, they discuss new and long-standing phishing trends that challenge government agencies and contractors in 2022. In order to safeguard confidential information and effectively mitigate the risk of security breaches, public sector employees must be aware of the signs and trends of phishing attacks. 
]]></description>
      <pubDate>Thu, 1 Dec 2022 18:08:29 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Cofense)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cofense-q3-phishing-and-threat-intelligence-report-6oY1dXDt</link>
      <enclosure length="36410794" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b835142a-fcbc-4101-821c-7abcdadde14a/audio/36d3325e-8b2e-4d9a-99ed-109d9b769707/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cofense Q3 Phishing and Threat Intelligence Report</itunes:title>
      <itunes:author>Carahsoft, Cofense</itunes:author>
      <itunes:duration>00:37:53</itunes:duration>
      <itunes:summary>In this episode, Nikhil Gupta, Core Cyber Demo Specialist at Carahsoft, is joined by Joseph Gallop, Cyber Threat Intelligence Manager, Practitioner at Cofense. Together, they discuss new and long-standing phishing trends that challenge government agencies and contractors in 2022. In order to safeguard confidential information and effectively mitigate the risk of security breaches, public sector employees must be aware of the signs and trends of phishing attacks.</itunes:summary>
      <itunes:subtitle>In this episode, Nikhil Gupta, Core Cyber Demo Specialist at Carahsoft, is joined by Joseph Gallop, Cyber Threat Intelligence Manager, Practitioner at Cofense. Together, they discuss new and long-standing phishing trends that challenge government agencies and contractors in 2022. In order to safeguard confidential information and effectively mitigate the risk of security breaches, public sector employees must be aware of the signs and trends of phishing attacks.</itunes:subtitle>
      <itunes:keywords>link, scrutinizing, computer, users, q3, general, software, trends, government, phishing, intel, malware, threat actors, cyber, bot, it, domains, targeting, credential, joe, government contractors, email, cybersecurity, urls, attachment, security, people</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>186</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8045082a-ea46-4010-9ea8-560080a12eee</guid>
      <title>Headlines in Cybersecurity: Moving to Zero Trust with Gigamon</title>
      <description><![CDATA[State and local agencies see implementing zero trust architecture in their immediate future – 67 percent of state CIOs who responded to the 2021 Annual State CIO Survey anticipate that introducing or expanding a zero-trust framework will receive more attention in the next two to three years. 
]]></description>
      <pubDate>Tue, 1 Nov 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/headlines-in-cybersecurity-moving-to-zero-trust-with-gigamon-bpBI3ORY</link>
      <enclosure length="53930621" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/3b663f14-23a0-49cb-a236-6145fe84b4d0/audio/82309b99-fbc1-4265-a7d1-a5818ee152c7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Headlines in Cybersecurity: Moving to Zero Trust with Gigamon</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:56:10</itunes:duration>
      <itunes:summary>State and local agencies see implementing zero trust architecture in their immediate future – 67 percent of state CIOs who responded to the 2021 Annual State CIO Survey anticipate that introducing or expanding a zero-trust framework will receive more attention in the next two to three years.</itunes:summary>
      <itunes:subtitle>State and local agencies see implementing zero trust architecture in their immediate future – 67 percent of state CIOs who responded to the 2021 Annual State CIO Survey anticipate that introducing or expanding a zero-trust framework will receive more attention in the next two to three years.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>185</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">867da403-e934-4ef8-ac1a-a05e52315bdf</guid>
      <title>Headlines in Cybersecurity: Ransomware with Ivanti</title>
      <description><![CDATA[Ransomware threats are targeting state and local agencies with increasing frequency. At the same time, more state legislatures have banned their agencies from paying ransomware. These trends are on a collision course, making protection against ransomware even more urgent. 
]]></description>
      <pubDate>Tue, 1 Nov 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/headlines-in-cybersecurity-ransomware-with-ivanti-2_SFF_8K</link>
      <enclosure length="53666889" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fb60d8a3-cf4e-47bf-9b8b-7bcce570cba0/audio/31dc30ef-77c1-4600-aaeb-985768de523a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Headlines in Cybersecurity: Ransomware with Ivanti</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:55:54</itunes:duration>
      <itunes:summary>Ransomware threats are targeting state and local agencies with increasing frequency. At the same time, more state legislatures have banned their agencies from paying ransomware. These trends are on a collision course, making protection against ransomware even more urgent.</itunes:summary>
      <itunes:subtitle>Ransomware threats are targeting state and local agencies with increasing frequency. At the same time, more state legislatures have banned their agencies from paying ransomware. These trends are on a collision course, making protection against ransomware even more urgent.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>183</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7e34cfa9-05f4-4185-aaea-4cba966d70a7</guid>
      <title>Headlines in Cybersecurity: Supply Chain Hacks with Ivanti</title>
      <description><![CDATA[Cybersecurity professionals throughout all levels of government and the private sector are painfully aware of the risks to their own networks posed by third parties with authorized access – but insufficient security measures of their own. Supply chain hacks are favored by cybercriminals because they gain access to company data, as well as the ability to often breach customers’ networks. 
]]></description>
      <pubDate>Tue, 1 Nov 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/headlines-in-cybersecurity-supply-chain-hacks-with-ivanti-GkNNgdjb</link>
      <enclosure length="53370556" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1810bf22-427f-4d01-8e3c-83ea90e381c0/audio/36047d05-7d93-4d17-ada9-349297432cf2/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Headlines in Cybersecurity: Supply Chain Hacks with Ivanti</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:55:35</itunes:duration>
      <itunes:summary>Cybersecurity professionals throughout all levels of government and the private sector are painfully aware of the risks to their own networks posed by third parties with authorized access – but insufficient security measures of their own. Supply chain hacks are favored by cybercriminals because they gain access to company data, as well as the ability to often breach customers’ networks.</itunes:summary>
      <itunes:subtitle>Cybersecurity professionals throughout all levels of government and the private sector are painfully aware of the risks to their own networks posed by third parties with authorized access – but insufficient security measures of their own. Supply chain hacks are favored by cybercriminals because they gain access to company data, as well as the ability to often breach customers’ networks.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>184</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0c009716-3912-43b5-8865-6992572a082e</guid>
      <title>Using Service Desk To Speed Up Ticket Resolution Times with SolarWinds</title>
      <description><![CDATA[Join Scott Pross, Vice President of Monalytic, a SolarWinds company, for a discussion on real-world solutions utilizing the Service Desk application. Listeners will learn how to stop repeating processes over and over and get more information from the end user to resolve issues quickly and set up proper workflows to get the right data in front of the right people. 
]]></description>
      <pubDate>Thu, 27 Oct 2022 17:11:43 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Monalytic, SolarWinds, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/using-service-desk-to-speed-up-ticket-resolution-times-with-solarwinds-IT_OoiAk</link>
      <enclosure length="39826581" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0fc0da61-18f4-41ee-9e42-75291cafca49/audio/bd8d0851-5f9d-4994-a090-7e9105818b79/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Using Service Desk To Speed Up Ticket Resolution Times with SolarWinds</itunes:title>
      <itunes:author>Monalytic, SolarWinds, Carahsoft</itunes:author>
      <itunes:duration>00:41:26</itunes:duration>
      <itunes:summary>Join Scott Pross, Vice President of Monalytic, a SolarWinds company, for a discussion on real-world solutions utilizing the Service Desk application. Listeners will learn how to stop repeating processes over and over and get more information from the end user to resolve issues quickly and set up proper workflows to get the right data in front of the right people.</itunes:summary>
      <itunes:subtitle>Join Scott Pross, Vice President of Monalytic, a SolarWinds company, for a discussion on real-world solutions utilizing the Service Desk application. Listeners will learn how to stop repeating processes over and over and get more information from the end user to resolve issues quickly and set up proper workflows to get the right data in front of the right people.</itunes:subtitle>
      <itunes:keywords>problem, service desk, computer, sla, software, provide, customer, cloud, solarwinds, answer, intel, product, it, team, solve, important, ticket, iteration, information, utilize, issue, person, questions, noc, cybersecurity, security, people</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>182</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5cae82f5-182d-4105-adb2-f1296be42705</guid>
      <title>Dive Into Carahsoft’s A2I Renewal Partner Program with VMware</title>
      <description><![CDATA[Listen to the latest VMware Renewals podcast to hear Tevin Clyde, VMware Renewals, and Nick Wager, Pre-Sales System Engineer, as they explore the offers and benefits of Carahsoft’s Affinity to Infinity (A2I) VMware Renewals Partner Program. 
]]></description>
      <pubDate>Tue, 18 Oct 2022 16:49:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware Renewals, Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/dive-into-carahsofts-a2i-renewal-partner-program-with-vmware-VFz2n5n_</link>
      <enclosure length="18600416" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4f5a2eca-f791-4aef-b665-f698ae2073e0/audio/a9a591d2-a8e1-429c-9114-f2e9e7dfeb5a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Dive Into Carahsoft’s A2I Renewal Partner Program with VMware</itunes:title>
      <itunes:author>VMware Renewals, Carahsoft, VMware</itunes:author>
      <itunes:duration>00:19:21</itunes:duration>
      <itunes:summary>Listen to the latest VMware Renewals podcast to hear Tevin Clyde, VMware Renewals, and Nick Wager, Pre-Sales System Engineer, as they explore the offers and benefits of Carahsoft’s Affinity to Infinity (A2I) VMware Renewals Partner Program.</itunes:summary>
      <itunes:subtitle>Listen to the latest VMware Renewals podcast to hear Tevin Clyde, VMware Renewals, and Nick Wager, Pre-Sales System Engineer, as they explore the offers and benefits of Carahsoft’s Affinity to Infinity (A2I) VMware Renewals Partner Program.</itunes:subtitle>
      <itunes:keywords>customers, computer, solution, software, options, partners, provide, opportunities, cloud, day, government, works, upsell, renewal, environment, intel, a2i, it, absolutely, assist, vmware, big, reseller, happy, cybersecurity, security, program</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>181</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1697442c-920b-48c8-9106-d8bdfd69e436</guid>
      <title>Threat Hunting Masterclass Session 2: Threat Hunting And Living Off The (Cyber) Landscape</title>
      <description><![CDATA[The second session takes a grassroots view of the threat hunting and hunt forward missions specifically looking at live fire scenarios and views from the front where convergence of IT, OT and IOT networks have been compromised. 
]]></description>
      <pubDate>Wed, 12 Oct 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/threat-hunting-masterclass-session-2-threat-hunting-and-living-off-the-cyber-landscape-MDH9PDWD</link>
      <enclosure length="39899563" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/47299006-8144-433e-82b2-56be7bef2fb2/audio/c3eec096-e702-4cb4-97ce-e3b6f0cd80d1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Threat Hunting Masterclass Session 2: Threat Hunting And Living Off The (Cyber) Landscape</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:41:33</itunes:duration>
      <itunes:summary>The second session takes a grassroots view of the threat hunting and hunt forward missions specifically looking at live fire scenarios and views from the front where convergence of IT, OT and IOT networks have been compromised.</itunes:summary>
      <itunes:subtitle>The second session takes a grassroots view of the threat hunting and hunt forward missions specifically looking at live fire scenarios and views from the front where convergence of IT, OT and IOT networks have been compromised.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>179</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d15bcd45-516e-4899-917d-66066994cef4</guid>
      <title>Threat Hunting Masterclass Session 3: Living off the land with Threat Hunting – Closing the loop on the Hunt Mission</title>
      <description><![CDATA[The third session will round out our three part series where we have explored the theory behind, practical uses of and now the live performance of the threat hunting mission and the hunt forward approach to information collection and TTP proliferation. Built with the mindset of the security operator or asset owner, we’ll step you through each phase of the assessment and how best to consolidate your information to make the best use of that data. 
]]></description>
      <pubDate>Wed, 12 Oct 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/threat-hunting-masterclass-session-3-living-off-the-land-with-threat-hunting-closing-the-loop-on-the-hunt-mission-QxUgMEtq</link>
      <enclosure length="37606640" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ec46fc38-d7bb-47d0-badd-15d06e6fdb66/audio/0d830a61-c540-4a54-821d-e54b29c7bc41/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Threat Hunting Masterclass Session 3: Living off the land with Threat Hunting – Closing the loop on the Hunt Mission</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:39:09</itunes:duration>
      <itunes:summary>The third session will round out our three part series where we have explored the theory behind, practical uses of and now the live performance of the threat hunting mission and the hunt forward approach to information collection and TTP proliferation. Built with the mindset of the security operator or asset owner, we’ll step you through each phase of the assessment and how best to consolidate your information to make the best use of that data.</itunes:summary>
      <itunes:subtitle>The third session will round out our three part series where we have explored the theory behind, practical uses of and now the live performance of the threat hunting mission and the hunt forward approach to information collection and TTP proliferation. Built with the mindset of the security operator or asset owner, we’ll step you through each phase of the assessment and how best to consolidate your information to make the best use of that data.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>180</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fa199399-b254-4542-bdac-4adfc52c01ea</guid>
      <title>Threat Hunting Masterclass Session 1: How to Make Sense of the Who, Why, and What in the Wire</title>
      <description><![CDATA[Listen to session one to hear real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. This first session will walk viewers through examples where those in command are making the best use of Attack Surface Analysis platforms as well as harnessing the capabilities that can be found by making better use of the current cybersecurity efforts. 
]]></description>
      <pubDate>Wed, 12 Oct 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/threat-hunting-masterclass-session-1-how-to-make-sense-of-the-who-why-and-what-in-the-wire-am6npsGa</link>
      <enclosure length="27991208" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/3e87f522-47c7-472f-8e09-88c5a86e3683/audio/c5725b17-ca2d-48f8-a403-78e766bb1c63/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Threat Hunting Masterclass Session 1: How to Make Sense of the Who, Why, and What in the Wire</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:29:08</itunes:duration>
      <itunes:summary>Listen to session one to hear real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. This first session will walk viewers through examples where those in command are making the best use of Attack Surface Analysis platforms as well as harnessing the capabilities that can be found by making better use of the current cybersecurity efforts.</itunes:summary>
      <itunes:subtitle>Listen to session one to hear real-life examples of teams, tradecraft, and technologies that are changing the way we see the cybersecurity situation. This first session will walk viewers through examples where those in command are making the best use of Attack Surface Analysis platforms as well as harnessing the capabilities that can be found by making better use of the current cybersecurity efforts.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>178</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1976e4ae-ef6c-4869-afe2-71043f82faaa</guid>
      <title>Build Resistance to Attacks by Unlocking the Value of Ethical Hackers</title>
      <description><![CDATA[Learn why it’s time to implement an attack resistance management strategy to find unknown risks within your attack surface – the things automated tools miss. Through continuous testing and security expertise of ethical hackers, agencies can identify critical security gaps and prioritize fixes for exploitable assets. 

 
]]></description>
      <pubDate>Wed, 21 Sep 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/build-resistance-to-attacks-by-unlocking-the-value-of-ethical-hackers-PAGJzlvq</link>
      <enclosure length="31603183" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/568f715d-3556-4be8-99c1-d9a26a968e61/audio/966c7ae6-3f43-45c8-b9d6-5e170cd3e7d5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Build Resistance to Attacks by Unlocking the Value of Ethical Hackers</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:32:54</itunes:duration>
      <itunes:summary>Learn why it’s time to implement an attack resistance management strategy to find unknown risks within your attack surface – the things automated tools miss. Through continuous testing and security expertise of ethical hackers, agencies can identify critical security gaps and prioritize fixes for exploitable assets. 

</itunes:summary>
      <itunes:subtitle>Learn why it’s time to implement an attack resistance management strategy to find unknown risks within your attack surface – the things automated tools miss. Through continuous testing and security expertise of ethical hackers, agencies can identify critical security gaps and prioritize fixes for exploitable assets. 

</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>177</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1d656d58-4fa9-4f54-82ab-732b4f2af198</guid>
      <title>Meeting Federal Zero Trust Standard with Microsoft Sensitivity Labels with AvePoint</title>
      <description><![CDATA[In January, the White House released Memo M-22-09 that mandated, "Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information." Simultaneously, there has been a 44% increase in workers' use of collaboration tools since 2019. Listen to this podcast from AvePoint and Carahsoft to learn how Microsoft's sensitivity labels can help your agencies on the path to complying with M-22-09. We will outline key insights into how AvePoint enhances Microsoft's native security capabilities, including: • The function of Microsoft sensitivity labels • How to put sensitivity label decisions into the hands of workspace owners (i.e., Teams, Groups, sites) • Actionable reporting based on Microsoft's sensitive information types and exposure 
]]></description>
      <pubDate>Tue, 20 Sep 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, AvePoint)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/meeting-federal-zero-trust-standard-with-microsoft-sensitivity-labels-with-avepoint-1wPzveFP</link>
      <enclosure length="42561713" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/816a3a1d-90af-4b62-9cb7-7d9c808e1dc4/audio/740ed42e-d0b4-4d66-ba2a-83f17a709bef/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Meeting Federal Zero Trust Standard with Microsoft Sensitivity Labels with AvePoint</itunes:title>
      <itunes:author>Carahsoft, AvePoint</itunes:author>
      <itunes:duration>00:44:20</itunes:duration>
      <itunes:summary>In January, the White House released Memo M-22-09 that mandated, &quot;Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information.&quot; Simultaneously, there has been a 44% increase in workers&apos; use of collaboration tools since 2019. Listen to this podcast from AvePoint and Carahsoft to learn how Microsoft&apos;s sensitivity labels can help your agencies on the path to complying with M-22-09. We will outline key insights into how AvePoint enhances Microsoft&apos;s native security capabilities, including: • The function of Microsoft sensitivity labels • How to put sensitivity label decisions into the hands of workspace owners (i.e., Teams, Groups, sites) • Actionable reporting based on Microsoft&apos;s sensitive information types and exposure</itunes:summary>
      <itunes:subtitle>In January, the White House released Memo M-22-09 that mandated, &quot;Federal security teams and data teams work together to develop data categories and security rules to automatically detect and ultimately block unauthorized access to sensitive information.&quot; Simultaneously, there has been a 44% increase in workers&apos; use of collaboration tools since 2019. Listen to this podcast from AvePoint and Carahsoft to learn how Microsoft&apos;s sensitivity labels can help your agencies on the path to complying with M-22-09. We will outline key insights into how AvePoint enhances Microsoft&apos;s native security capabilities, including: • The function of Microsoft sensitivity labels • How to put sensitivity label decisions into the hands of workspace owners (i.e., Teams, Groups, sites) • Actionable reporting based on Microsoft&apos;s sensitive information types and exposure</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>176</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1989bf0-c649-4b3f-9684-62ec947eb43f</guid>
      <title>FCW ICAM Workshop ft. Keeper Security: Securing Every User and Every Application, on Every Device</title>
      <description><![CDATA[Listen to FCW, Keeper Security, and Carahsoft’s latest podcast on the topic of "Securing every user, every application on every device." This episode is an extension of Keeper Security’s presentation at FCW’s recent ICAM Workshop. 
]]></description>
      <pubDate>Thu, 15 Sep 2022 14:27:17 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, FCW, Keeper Security)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/fcw-icam-workshop-ft-keeper-security-securing-every-user-and-every-application-on-every-device-_in9wwjQ</link>
      <enclosure length="23212968" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5f30b2cc-fffc-4c7d-9b81-69acce6f784d/audio/c34cb3e9-8f35-4823-a190-63e9c5bcd27c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>FCW ICAM Workshop ft. Keeper Security: Securing Every User and Every Application, on Every Device</itunes:title>
      <itunes:author>Carahsoft, FCW, Keeper Security</itunes:author>
      <itunes:duration>00:24:08</itunes:duration>
      <itunes:summary>Listen to FCW, Keeper Security, and Carahsoft’s latest podcast on the topic of &quot;Securing every user, every application on every device.&quot; This episode is an extension of Keeper Security’s presentation at FCW’s recent ICAM Workshop.</itunes:summary>
      <itunes:subtitle>Listen to FCW, Keeper Security, and Carahsoft’s latest podcast on the topic of &quot;Securing every user, every application on every device.&quot; This episode is an extension of Keeper Security’s presentation at FCW’s recent ICAM Workshop.</itunes:subtitle>
      <itunes:keywords>problem, ssl, computer, trust, single, software, user, visibility, breached, keeper, cyberattack, intel, credentials, device, organizations, seamless, it, password, solve, secrets, sso, management, idea, cybersecurity, security, enterprise</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>175</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a5abd28b-43b0-4598-b639-06e1296039c1</guid>
      <title>Powering Secure R&amp;D Collaboration with Box</title>
      <description><![CDATA[Join us to learn how several leading federal research organizations leverage the power of the Box Content Cloud to power their R&D missions. 
]]></description>
      <pubDate>Thu, 8 Sep 2022 15:26:25 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (FCW, Keeper Security, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/powering-secure-rd-collaboration-with-box-kV1GUDLr</link>
      <enclosure length="42832733" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ecedb46b-f755-4853-86a7-0b45c4cd29cb/audio/cc330b59-c2b4-4d3c-b8e0-9b168cce41a7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Powering Secure R&amp;D Collaboration with Box</itunes:title>
      <itunes:author>FCW, Keeper Security, Carahsoft</itunes:author>
      <itunes:duration>00:44:17</itunes:duration>
      <itunes:summary>Join us to learn how several leading federal research organizations leverage the power of the Box Content Cloud to power their R&amp;D missions.</itunes:summary>
      <itunes:subtitle>Join us to learn how several leading federal research organizations leverage the power of the Box Content Cloud to power their R&amp;D missions.</itunes:subtitle>
      <itunes:keywords>customers, r&amp;d, end users, mission, software, box, partners, cloud, case, secure, researchers, technology, va, data, agencies, it, compliance, sharing, collaboration, cybersecurity, security, computers, people, support</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>174</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">705263a0-4316-4083-9cae-4ad5ab2c5112</guid>
      <title>Gaps Exist in Your Monitoring Infrastructure — Know Your Weaknesses with SolarWinds</title>
      <description><![CDATA[Although no monitoring architecture is perfect, most monitoring issues can be traced back to avoidable gaps. Join Monalytic Vice President of Technology Scott Pross to learn how to find these problematic blind spots and mitigate “unknown” gaps before they impact valuable uptime, so teams can become proactive in resolving issues before disruptions happen. 
]]></description>
      <pubDate>Fri, 26 Aug 2022 19:41:35 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (SolarWinds, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/gaps-exist-in-your-monitoring-infrastructure-know-your-weaknesses-jxCb5VWe</link>
      <enclosure length="36307188" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7e0bbb3c-ba76-4277-a461-7b4744ceb892/audio/aa57b538-375e-4e72-9464-ed8b082d5ce4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Gaps Exist in Your Monitoring Infrastructure — Know Your Weaknesses with SolarWinds</itunes:title>
      <itunes:author>SolarWinds, Carahsoft</itunes:author>
      <itunes:duration>00:37:46</itunes:duration>
      <itunes:summary>Although no monitoring architecture is perfect, most monitoring issues can be traced back to avoidable gaps. Join Monalytic Vice President of Technology Scott Pross to learn how to find these problematic blind spots and mitigate “unknown” gaps before they impact valuable uptime, so teams can become proactive in resolving issues before disruptions happen.</itunes:summary>
      <itunes:subtitle>Although no monitoring architecture is perfect, most monitoring issues can be traced back to avoidable gaps. Join Monalytic Vice President of Technology Scott Pross to learn how to find these problematic blind spots and mitigate “unknown” gaps before they impact valuable uptime, so teams can become proactive in resolving issues before disruptions happen.</itunes:subtitle>
      <itunes:keywords>customers, problem, r, computer, business, software, network, mitigate, cyberrisk, solarwinds, cyberthreat, tools, threat, web portal, it, remediation, monitoring, cs, identifying, remediate, agency, module, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>173</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6cd9abbf-ea21-4cf7-a13d-cf78e16b2020</guid>
      <title>Explore What&apos;s New with VMware Renewals Horizon</title>
      <description><![CDATA[On behalf of VMware and Carahsoft, we would like to welcome you to today’s podcast focused on VMware Horizon Renewals, we are lucky enough to have Nick Wager, our Pre-Sales System Engineer, as he discusses everything you need to know about VMware Horizon. 
]]></description>
      <pubDate>Fri, 26 Aug 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/explore-whats-new-with-vmware-renewals-horizon-gGE2fIsl</link>
      <enclosure length="20576926" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5ddc3b66-fbcc-4415-88b3-2ffe659411d9/audio/9a720407-fe60-48f6-897a-f5e50bcd03a5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Explore What&apos;s New with VMware Renewals Horizon</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:21:25</itunes:duration>
      <itunes:summary>On behalf of VMware and Carahsoft, we would like to welcome you to today’s podcast focused on VMware Horizon Renewals, we are lucky enough to have Nick Wager, our Pre-Sales System Engineer, as he discusses everything you need to know about VMware Horizon.</itunes:summary>
      <itunes:subtitle>On behalf of VMware and Carahsoft, we would like to welcome you to today’s podcast focused on VMware Horizon Renewals, we are lucky enough to have Nick Wager, our Pre-Sales System Engineer, as he discusses everything you need to know about VMware Horizon.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>172</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9cf6e810-ffd5-4213-bec1-928dec4354ee</guid>
      <title>Organizational Resiliency and Operational Risk Factors</title>
      <description><![CDATA[A successful resiliency program aligns your impact analysis, continuity planning, IT disaster recovery planning, crisis management and incident response activities with your organization's broader business strategy and objectives. Resiliency requires building processes and technologies that naturally adapt to adverse conditions, make mid-course corrections, and avoid many of the negative impacts of a disruption. This session will focus on how an organizations resiliency can positively impact its overall operational risk. 
]]></description>
      <pubDate>Fri, 12 Aug 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Archer, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/organizational-resiliency-and-operational-risk-factors-LtrzOsxw</link>
      <enclosure length="27281543" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/44bf8021-5150-4515-bcca-be251285d96a/audio/f1410060-aac6-4b52-b6a8-ddf8c6e37e8e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Organizational Resiliency and Operational Risk Factors</itunes:title>
      <itunes:author>Archer, Carahsoft</itunes:author>
      <itunes:duration>00:28:25</itunes:duration>
      <itunes:summary>A successful resiliency program aligns your impact analysis, continuity planning, IT disaster recovery planning, crisis management and incident response activities with your organization&apos;s broader business strategy and objectives. Resiliency requires building processes and technologies that naturally adapt to adverse conditions, make mid-course corrections, and avoid many of the negative impacts of a disruption. This session will focus on how an organizations resiliency can positively impact its overall operational risk.</itunes:summary>
      <itunes:subtitle>A successful resiliency program aligns your impact analysis, continuity planning, IT disaster recovery planning, crisis management and incident response activities with your organization&apos;s broader business strategy and objectives. Resiliency requires building processes and technologies that naturally adapt to adverse conditions, make mid-course corrections, and avoid many of the negative impacts of a disruption. This session will focus on how an organizations resiliency can positively impact its overall operational risk.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>169</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ff4f067a-d1a7-4af4-b603-d0b90b0fd6f5</guid>
      <title>Frenemies: Differing Viewpoints of Government Technology C-Suite Roles</title>
      <description><![CDATA[The Chief Information Officer (CIO) and Chief Information Security Officer (CISO) are both important roles within any organization but can have differing views and challenges when delivering technology and services for their City. This session will explore the complex relationship between the CIO and CISO and how better understanding the other's perspectives and priorities can help accomplish the City's security goals. 
]]></description>
      <pubDate>Fri, 12 Aug 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Archer)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/frenemies-differing-viewpoints-of-government-technology-c-suite-roles-PbCa89K2</link>
      <enclosure length="21764064" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fb830285-8f54-41c1-921a-af9b625c00f0/audio/9ee87944-b0ac-4f7b-81bb-78b3eb1af6a8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Frenemies: Differing Viewpoints of Government Technology C-Suite Roles</itunes:title>
      <itunes:author>Carahsoft, Archer</itunes:author>
      <itunes:duration>00:22:40</itunes:duration>
      <itunes:summary>The Chief Information Officer (CIO) and Chief Information Security Officer (CISO) are both important roles within any organization but can have differing views and challenges when delivering technology and services for their City. This session will explore the complex relationship between the CIO and CISO and how better understanding the other&apos;s perspectives and priorities can help accomplish the City&apos;s security goals.</itunes:summary>
      <itunes:subtitle>The Chief Information Officer (CIO) and Chief Information Security Officer (CISO) are both important roles within any organization but can have differing views and challenges when delivering technology and services for their City. This session will explore the complex relationship between the CIO and CISO and how better understanding the other&apos;s perspectives and priorities can help accomplish the City&apos;s security goals.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>170</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d0b7a12f-ea44-4dcc-a86d-d1d2f8edbdb7</guid>
      <title>Third Party Risk Management - Strength or Weakest Link?</title>
      <description><![CDATA[Government organizations increasingly rely on third parties to help support operations, their employees and in many cases the public they serve. While it is possible to outsource many activities to third parties, organizations retain the risks associated with their third-party relationships. This session will focus on why organizations need to deeply understand the risks third-party providers present and why its critically important to have impactful controls in place in order to manage risk within acceptable boundaries. 
]]></description>
      <pubDate>Fri, 12 Aug 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Archer, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/third-party-risk-management-strength-or-weakest-link-SBoMQiJR</link>
      <enclosure length="31133873" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e500a059-bf16-4d5a-9f93-6b7ed91abf3a/audio/0fb8b029-1c3d-4360-9818-e79243825887/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Third Party Risk Management - Strength or Weakest Link?</itunes:title>
      <itunes:author>Archer, Carahsoft</itunes:author>
      <itunes:duration>00:32:25</itunes:duration>
      <itunes:summary>Government organizations increasingly rely on third parties to help support operations, their employees and in many cases the public they serve. While it is possible to outsource many activities to third parties, organizations retain the risks associated with their third-party relationships. This session will focus on why organizations need to deeply understand the risks third-party providers present and why its critically important to have impactful controls in place in order to manage risk within acceptable boundaries.</itunes:summary>
      <itunes:subtitle>Government organizations increasingly rely on third parties to help support operations, their employees and in many cases the public they serve. While it is possible to outsource many activities to third parties, organizations retain the risks associated with their third-party relationships. This session will focus on why organizations need to deeply understand the risks third-party providers present and why its critically important to have impactful controls in place in order to manage risk within acceptable boundaries.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>167</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e98d944c-5472-4008-98d6-d27545250be3</guid>
      <title>Cyber Risk Challenges and Opportunities</title>
      <description><![CDATA[With the constant change in technology and the rising cyber threats, government organizations struggle to understand and translate cyber risks into the context of risk. Organizations can be overwhelmed by the magnitude, velocity and complexity of existing and emerging cyber risks. This session will focus on the challenges and yet opportunities government organizations have to determine assets critical to operations, ability to obtain and leverage actionable information, establish and communicate security policies and standards, detect and respond to attacks, identify and remediate security deficiencies, and establish clear IT risk management best practices. 
]]></description>
      <pubDate>Fri, 12 Aug 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Archer, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cyber-risk-challenges-and-opportunities-Ixj_gaeb</link>
      <enclosure length="30824583" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fe70a947-617a-4e7e-90f6-2aa688043bad/audio/01897451-87e7-4a00-a5c2-b25889c25771/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cyber Risk Challenges and Opportunities</itunes:title>
      <itunes:author>Archer, Carahsoft</itunes:author>
      <itunes:duration>00:32:06</itunes:duration>
      <itunes:summary>With the constant change in technology and the rising cyber threats, government organizations struggle to understand and translate cyber risks into the context of risk. Organizations can be overwhelmed by the magnitude, velocity and complexity of existing and emerging cyber risks. This session will focus on the challenges and yet opportunities government organizations have to determine assets critical to operations, ability to obtain and leverage actionable information, establish and communicate security policies and standards, detect and respond to attacks, identify and remediate security deficiencies, and establish clear IT risk management best practices.</itunes:summary>
      <itunes:subtitle>With the constant change in technology and the rising cyber threats, government organizations struggle to understand and translate cyber risks into the context of risk. Organizations can be overwhelmed by the magnitude, velocity and complexity of existing and emerging cyber risks. This session will focus on the challenges and yet opportunities government organizations have to determine assets critical to operations, ability to obtain and leverage actionable information, establish and communicate security policies and standards, detect and respond to attacks, identify and remediate security deficiencies, and establish clear IT risk management best practices.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>168</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b565a1c3-658d-4272-aa93-d213cdc8bf8c</guid>
      <title>Grants: Free Money with Strings Attached</title>
      <description><![CDATA[The Infrastructure Investment and Jobs Act includes a $1 billion State and Local Cybersecurity Grant Program. This is an exciting opportunity for State and Local governments to collaborate and align strategic cybersecurity priorities. However, there are still many unknowns associated with this funding opportunity. This session will explore the Federal, State and Local government expectations of the grant funding and discuss approaches to building a cohesive grant submission. 
]]></description>
      <pubDate>Fri, 12 Aug 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Archer)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/grants-free-money-with-strings-attached-ILcI13sJ</link>
      <enclosure length="39141971" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/862e73ca-2456-4956-bdc1-a08670689bfb/audio/63fb335c-e35d-4a2e-91e7-7d71cb33f7ce/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Grants: Free Money with Strings Attached</itunes:title>
      <itunes:author>Carahsoft, Archer</itunes:author>
      <itunes:duration>00:40:46</itunes:duration>
      <itunes:summary>The Infrastructure Investment and Jobs Act includes a $1 billion State and Local Cybersecurity Grant Program. This is an exciting opportunity for State and Local governments to collaborate and align strategic cybersecurity priorities. However, there are still many unknowns associated with this funding opportunity. This session will explore the Federal, State and Local government expectations of the grant funding and discuss approaches to building a cohesive grant submission.</itunes:summary>
      <itunes:subtitle>The Infrastructure Investment and Jobs Act includes a $1 billion State and Local Cybersecurity Grant Program. This is an exciting opportunity for State and Local governments to collaborate and align strategic cybersecurity priorities. However, there are still many unknowns associated with this funding opportunity. This session will explore the Federal, State and Local government expectations of the grant funding and discuss approaches to building a cohesive grant submission.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>171</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cbf37d93-c9d2-4165-8a28-ba45b33c1e4e</guid>
      <title>Fight Cybercrime with X-Ray Vision with Trustwave</title>
      <description><![CDATA[Trustwave Government Solutions Managed Security Services (MSS) is the combination of the industry’s best preventive and detective tools under a world-class managed services umbrella with unrivaled global threat intelligence. 
]]></description>
      <pubDate>Wed, 20 Jul 2022 18:32:37 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Trustwave)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/fight-cybercrime-with-x-ray-vision-with-trustwave-kdSvhia6</link>
      <enclosure length="27342567" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1b960660-6053-4fb8-9b17-543c5ab231f5/audio/9c57bfbd-8174-40e1-b128-321f2ffa78c4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Fight Cybercrime with X-Ray Vision with Trustwave</itunes:title>
      <itunes:author>Carahsoft, Trustwave</itunes:author>
      <itunes:duration>00:28:26</itunes:duration>
      <itunes:summary>Trustwave Government Solutions Managed Security Services (MSS) is the combination of the industry’s best preventive and detective tools under a world-class managed services umbrella with unrivaled global threat intelligence.</itunes:summary>
      <itunes:subtitle>Trustwave Government Solutions Managed Security Services (MSS) is the combination of the industry’s best preventive and detective tools under a world-class managed services umbrella with unrivaled global threat intelligence.</itunes:subtitle>
      <itunes:keywords>threats, storage, cybercrime, computer, business, services, software, mdr, tool, cloud, day, zero trust, technology, infrastructure, intel, threat, talk, organizations, it, edr, threat intelligence, arms, adversary, incident response, scenario, spend, smarter, cybersecurity, security, people</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>166</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fef8f056-d6d5-4ffa-ac69-7cbb3aa753e6</guid>
      <title>Ensure the Success of Fiscal Year Spend by Focusing on End User Experiences</title>
      <description><![CDATA[<p>Join Carahsoft and Riverbed Technology for an informed and engaging discussion led by <strong>Donald Kyzar</strong>, former CIO, Department of Justice’s Office of Inspector General and <strong>Marlin McFate</strong>, Riverbed’s Public Sector CTO about how federal agencies can cost effectively ensure the productivity, performance, and experiences of end users, applications, remote workforces, citizen-facing services, and IT investments with Digital Experience Monitoring (DEM) solutions.</p>
]]></description>
      <pubDate>Thu, 14 Jul 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (riverbed technology, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ensure-the-success-of-fiscal-year-spend-by-focusing-on-end-user-experiences-qvXMjjLu</link>
      <content:encoded><![CDATA[<p>Join Carahsoft and Riverbed Technology for an informed and engaging discussion led by <strong>Donald Kyzar</strong>, former CIO, Department of Justice’s Office of Inspector General and <strong>Marlin McFate</strong>, Riverbed’s Public Sector CTO about how federal agencies can cost effectively ensure the productivity, performance, and experiences of end users, applications, remote workforces, citizen-facing services, and IT investments with Digital Experience Monitoring (DEM) solutions.</p>
]]></content:encoded>
      <enclosure length="52820057" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/809999ed-b2b7-473b-824b-23b8dd2451ed/audio/5bb2f1b8-b987-487c-aea2-12162f25964b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ensure the Success of Fiscal Year Spend by Focusing on End User Experiences</itunes:title>
      <itunes:author>riverbed technology, Carahsoft</itunes:author>
      <itunes:duration>00:55:01</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>fiscal year spend, healthcare, network &amp; infrastructure, ic, data management, success, doj, end user experience, public sector, civ, dod, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>165</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">637bcf75-20ba-4c55-ada3-cb22f79f09bb</guid>
      <title>CyberTalks with the CISO with Venafi</title>
      <description><![CDATA[Stream Venafi’s latest podcast to hear from former USPS CISO, Greg Crabb as he presents his analysis and recommendations for Improving Your Federal Cybersecurity Practice in 2022. In this podcast, Greg Crabb will review the impacts of recent events and makes recommendations for planning for 2022. 
]]></description>
      <pubDate>Wed, 13 Jul 2022 16:32:08 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Venafi, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cybertalks-with-the-ciso-with-venafi-IhGFjogY</link>
      <enclosure length="47956744" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c23031c3-1a1c-46f7-b474-c0f8e0bbae7e/audio/60966a4b-ac11-4b64-82f3-ce8a5bdbae5a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>CyberTalks with the CISO with Venafi</itunes:title>
      <itunes:author>Venafi, Carahsoft</itunes:author>
      <itunes:duration>00:49:53</itunes:duration>
      <itunes:summary>Stream Venafi’s latest podcast to hear from former USPS CISO, Greg Crabb as he presents his analysis and recommendations for Improving Your Federal Cybersecurity Practice in 2022. In this podcast, Greg Crabb will review the impacts of recent events and makes recommendations for planning for 2022.</itunes:summary>
      <itunes:subtitle>Stream Venafi’s latest podcast to hear from former USPS CISO, Greg Crabb as he presents his analysis and recommendations for Improving Your Federal Cybersecurity Practice in 2022. In this podcast, Greg Crabb will review the impacts of recent events and makes recommendations for planning for 2022.</itunes:subtitle>
      <itunes:keywords>storage, applications, computer, organization, software, executive order, game, cloud, question, government, ciso, journey, vulnerabilities, greg, intel, importance, it, postal service, certificate, federal, important, scorecard, order, cybersecurity, security, perspective, improve, address, identify</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>164</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f0cc63ad-d518-4c17-9266-ca0de3a31626</guid>
      <title>Bridging the Gaps of Cybersecurity with Cofense</title>
      <description><![CDATA[Threat actors are evolving, preying on end users with clever, relevant, and timely phishing attacks, with no signs of slowing down or stopping. Listen in to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions. 
]]></description>
      <pubDate>Fri, 1 Jul 2022 13:47:49 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Cofense, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bridging-the-gaps-of-cybersecurity-with-cofense-56xraAd3</link>
      <enclosure length="35579088" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/80a3b6b6-e0bf-4d14-88b9-7b7d03163281/audio/39b70bcb-0d7a-41cf-aae4-2e5b5dc44888/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Bridging the Gaps of Cybersecurity with Cofense</itunes:title>
      <itunes:author>Cofense, Carahsoft</itunes:author>
      <itunes:duration>00:37:03</itunes:duration>
      <itunes:summary>Threat actors are evolving, preying on end users with clever, relevant, and timely phishing attacks, with no signs of slowing down or stopping. Listen in to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions.</itunes:summary>
      <itunes:subtitle>Threat actors are evolving, preying on end users with clever, relevant, and timely phishing attacks, with no signs of slowing down or stopping. Listen in to hear how agencies can bridge the gaps in the prioritization of investments in phishing protection solutions.</itunes:subtitle>
      <itunes:keywords>computer, software, executive order, phish, cloud, government, fraud, technology, intelligence, phishing, intel, threat, malware, it, public sector, threat intelligence, reported, email, cybersecurity, modernize, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>163</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9873f4f3-d703-4366-b2bf-55f886d99e42</guid>
      <title>Aligning ICAM, the Executive Order, and Zero Trust for the Defense Department</title>
      <description><![CDATA[<p>In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term “Zero Trust” from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify, and only allow access when contextual parameters are met. Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must protect identities to stop adversaries from getting into our networks, moving laterally, escalating privileges, and ultimately accessing and manipulating our data. Leveraging ICAM and robust identity security strategies enables agencies to move from a network-based approach to a data-centric approach to defending systems. </p><p>Join government security experts for a discussion to understand: </p><ul><li>Why Privileged Access Management (PAM) is essential to major DoD initiatives like ICAM, Thunderdome, and Zero Trust</li><li>How ICAM supports the Executive Order</li><li>The Defense Department’s outlook on data-centric security and defending agency systems</li><li>The path to secure modernization using Least Privilege</li></ul>
]]></description>
      <pubDate>Fri, 17 Jun 2022 21:26:05 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, BeyondTrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/aligning-icam-the-executive-order-and-zero-trust-for-the-defense-department-K6rzJNUA</link>
      <content:encoded><![CDATA[<p>In our rapidly changing digital world, agencies must evolve security strategies. A goal of Zero Trust is to create a security and network architecture that is dynamic, adaptable, and protected. The Executive Order on Cybersecurity has moved the term “Zero Trust” from a buzzword to a much-needed baseline for action planning around how we secure agency data and systems. Agencies must leverage Zero Trust principles to never trust, always verify, and only allow access when contextual parameters are met. Identity sits at the heart of Zero Trust. In a perimeter-less world, agencies must protect identities to stop adversaries from getting into our networks, moving laterally, escalating privileges, and ultimately accessing and manipulating our data. Leveraging ICAM and robust identity security strategies enables agencies to move from a network-based approach to a data-centric approach to defending systems. </p><p>Join government security experts for a discussion to understand: </p><ul><li>Why Privileged Access Management (PAM) is essential to major DoD initiatives like ICAM, Thunderdome, and Zero Trust</li><li>How ICAM supports the Executive Order</li><li>The Defense Department’s outlook on data-centric security and defending agency systems</li><li>The path to secure modernization using Least Privilege</li></ul>
]]></content:encoded>
      <enclosure length="55249596" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f21eb89e-1269-4051-951d-6181d2f24ae2/audio/0119e5d0-f3fe-486e-b2d9-70f78b5f0d5f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Aligning ICAM, the Executive Order, and Zero Trust for the Defense Department</itunes:title>
      <itunes:author>Carahsoft, BeyondTrust</itunes:author>
      <itunes:duration>00:57:33</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>defense department, data-centric security, executive order, least privilege, disa, zero trust, aligning icam, icam, thunderdome, us army, dod, systems innovation, deep water point, beyondtrust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>162</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a50e359c-00a4-4819-8199-3b64a52b14cc</guid>
      <title>Zero Trust and Your Agency: What It Will Take to Put Theory Into Practice with AvePoint</title>
      <description><![CDATA[Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024.  
]]></description>
      <pubDate>Thu, 16 Jun 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, AvePoint)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/zero-trust-and-your-agency-what-it-will-take-to-put-theory-into-practice-with-avepoint-Kp63JHxv</link>
      <enclosure length="49174663" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/35f339a9-8297-43d0-a53c-659aa001ffe6/audio/1dd26238-ed7a-41c1-a68a-6c2b2eb30aaa/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Zero Trust and Your Agency: What It Will Take to Put Theory Into Practice with AvePoint</itunes:title>
      <itunes:author>Carahsoft, AvePoint</itunes:author>
      <itunes:duration>00:51:13</itunes:duration>
      <itunes:summary>Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024. </itunes:summary>
      <itunes:subtitle>Zero Trust is essential for modern security architecture and a core protection framework for agile growth. Unlike old models that assume a level of trust once an asset is approved, Zero Trust never stops reviewing the asset as a potential threat. With this framework in mind, the White House released a new Executive Order to implement Zero Trust Architecture (ZTA) strategies across all federal agencies by the end of the Fiscal Year 2024. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>163</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fb6dd787-4d2e-4df0-9ade-de7caa46de30</guid>
      <title>Episode 3: A Zero Trust Approach to Secure Operational Technology Systems</title>
      <description><![CDATA[In this podcast, our panel establishes key steps agencies should take to modernize, converge, and align their IT and OT systems. 
]]></description>
      <pubDate>Wed, 8 Jun 2022 20:01:33 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Tenable, BeyondTrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/episode-3-a-zero-trust-approach-to-secure-operational-technology-systems-iCQi8lJY</link>
      <enclosure length="18318005" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9ba1c2e3-e09d-4892-905d-f6536df15941/audio/4e652a61-3619-4d9e-9670-4adfdcf5e2f1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Episode 3: A Zero Trust Approach to Secure Operational Technology Systems</itunes:title>
      <itunes:author>Carahsoft, Tenable, BeyondTrust</itunes:author>
      <itunes:duration>00:19:02</itunes:duration>
      <itunes:summary>In this podcast, our panel establishes key steps agencies should take to modernize, converge, and align their IT and OT systems.</itunes:summary>
      <itunes:subtitle>In this podcast, our panel establishes key steps agencies should take to modernize, converge, and align their IT and OT systems.</itunes:subtitle>
      <itunes:keywords>computer, trust, software, network, cloud, funding, secure, government, zero trust, risk, cyberthreat, technology, infrastructure, tech, environment, converge, cyber, ot, it, dod, industry, systems, vulnerability, operational technologies, operational technology, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>158</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1bed6e7d-7850-4329-84b1-fd7a168a2bcb</guid>
      <title>Mission First Podcast Series: Cybersecurity, From the White House to the Mission</title>
      <description><![CDATA[<p>Catch episode four of <i>Mission First</i>, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. </p><p>During this session, Rob Thorne, <i>Chief Information Security Officer</i>, Immigration and Customs Enforcement (ICE) and Craig Bowman, <i>Senior Director - Federal</i>, VMware, will discuss:</p><ul><li>The biggest strengths and weaknesses in government cybersecurity</li><li>How much Zero Trust is possible in an agency with aging infrastructure and limited budget</li><li>What the Chief Information Security Officer's role is in shaping your organization's security strategy</li></ul><p>Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.</p>
]]></description>
      <pubDate>Wed, 8 Jun 2022 17:42:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-podcast-series-cybersecurity-from-the-white-house-to-the-mission-B2DIhpqU</link>
      <content:encoded><![CDATA[<p>Catch episode four of <i>Mission First</i>, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. </p><p>During this session, Rob Thorne, <i>Chief Information Security Officer</i>, Immigration and Customs Enforcement (ICE) and Craig Bowman, <i>Senior Director - Federal</i>, VMware, will discuss:</p><ul><li>The biggest strengths and weaknesses in government cybersecurity</li><li>How much Zero Trust is possible in an agency with aging infrastructure and limited budget</li><li>What the Chief Information Security Officer's role is in shaping your organization's security strategy</li></ul><p>Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.</p>
]]></content:encoded>
      <enclosure length="31645710" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e8dc926c-c2b8-484c-9015-6dac7f2924f8/audio/490be979-ade2-4592-9a20-e8a08bc0d84d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First Podcast Series: Cybersecurity, From the White House to the Mission</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:32:19</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>157</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f1081568-4524-49c7-9c8f-6cb0126b0e21</guid>
      <title>Add an Early Warning System to Your Security Environment with Mandiant</title>
      <description><![CDATA[From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. This podcast will help you understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense program.

ASM can provide comprehensive visibility of your environment, while continuously discovering and analyzing assets to monitor them for risks. Listen to this podcast to hear insight on how ASM can help government agencies become more resilient by:

Detecting infrastructure changes and exposures in real-time
Managing cloud computing and shadow IT
Embedding governance into workflows
Building supply chain resilience
Extending security policy outside the enterprise 
]]></description>
      <pubDate>Wed, 8 Jun 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Mandiant)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/add-an-early-warning-system-to-your-security-environment-with-mandiant-vKFEvnb7</link>
      <enclosure length="24752472" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b0b9f34c-9843-40de-aa12-134f3c9e5df9/audio/8b548726-d587-4618-9d7f-fa8080edcbe9/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Add an Early Warning System to Your Security Environment with Mandiant</itunes:title>
      <itunes:author>Carahsoft, Mandiant</itunes:author>
      <itunes:duration>00:25:46</itunes:duration>
      <itunes:summary>From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. This podcast will help you understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense program.

ASM can provide comprehensive visibility of your environment, while continuously discovering and analyzing assets to monitor them for risks. Listen to this podcast to hear insight on how ASM can help government agencies become more resilient by:

Detecting infrastructure changes and exposures in real-time
Managing cloud computing and shadow IT
Embedding governance into workflows
Building supply chain resilience
Extending security policy outside the enterprise</itunes:summary>
      <itunes:subtitle>From Log4J to hybrid work models, the evolving and dynamic IT environment expands the attack surface creating more vulnerabilities and risks for public sector organizations. This podcast will help you understand the cyber security challenges Attack Surface Management (ASM) solves and how it can be easily integrated into any cyber defense program.

ASM can provide comprehensive visibility of your environment, while continuously discovering and analyzing assets to monitor them for risks. Listen to this podcast to hear insight on how ASM can help government agencies become more resilient by:

Detecting infrastructure changes and exposures in real-time
Managing cloud computing and shadow IT
Embedding governance into workflows
Building supply chain resilience
Extending security policy outside the enterprise</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>161</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2500bb89-1b28-43ce-a066-f7bcc9b9a0a9</guid>
      <title>Episode 2: A Zero Trust Approach to Secure Operational Technology Systems</title>
      <description><![CDATA[In this podcast, our panel emphasizes the importance of thorough planning in executing a strong IT/OT convergence and outlines key items to account for. 
]]></description>
      <pubDate>Tue, 17 May 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/episode-2-a-zero-trust-approach-to-secure-operational-technology-systems-bIX_FBRb</link>
      <enclosure length="16236136" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/a3604284-334c-4bb9-b5b3-59b0ec1131b0/audio/15947957-d75a-48fc-9282-dd5f4338751a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Episode 2: A Zero Trust Approach to Secure Operational Technology Systems</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:16:54</itunes:duration>
      <itunes:summary>In this podcast, our panel emphasizes the importance of thorough planning in executing a strong IT/OT convergence and outlines key items to account for.</itunes:summary>
      <itunes:subtitle>In this podcast, our panel emphasizes the importance of thorough planning in executing a strong IT/OT convergence and outlines key items to account for.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>160</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5076dd17-b0ae-4612-94ee-1f88a634e55b</guid>
      <title>The Future of Storage for Workloads with Dell Technologies</title>
      <description><![CDATA[The future of storage is here at Dell Technologies with powerful, efficient, and intelligent enterprise arrays. Hear from subject matter experts on the Dell Technologies advantage and how it can accelerate your transformations with multi-dimensional data storage, protection, and much more! 
]]></description>
      <pubDate>Fri, 13 May 2022 15:11:32 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Dell Technologies)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-future-of-storage-for-workloads-with-dell-technologies-9oGRLWA_</link>
      <enclosure length="72382551" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4d6be7d8-ff0e-45a0-ad24-102823801383/audio/7cdeea30-66b0-497c-9ce9-23463fd150b0/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Future of Storage for Workloads with Dell Technologies</itunes:title>
      <itunes:author>Carahsoft, Dell Technologies</itunes:author>
      <itunes:duration>00:50:19</itunes:duration>
      <itunes:summary>The future of storage is here at Dell Technologies with powerful, efficient, and intelligent enterprise arrays. Hear from subject matter experts on the Dell Technologies advantage and how it can accelerate your transformations with multi-dimensional data storage, protection, and much more!</itunes:summary>
      <itunes:subtitle>The future of storage is here at Dell Technologies with powerful, efficient, and intelligent enterprise arrays. Hear from subject matter experts on the Dell Technologies advantage and how it can accelerate your transformations with multi-dimensional data storage, protection, and much more!</itunes:subtitle>
      <itunes:keywords>storage, app, server, applications, computer, dell, platform, software, protect, cloud, workloads, simplicity, cyberthreat, technology, data center, it, vmware, dell technologies, vxrail, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>159</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ccc92273-2e2f-4336-ba61-714930d81fea</guid>
      <title>Answer the White House Call to Action – Increase Cyber Defense with Exodus Intelligence</title>
      <description><![CDATA[Exodus Intelligence employs some of the world's most advanced reverse-engineers and exploit developers to provide government agencies the unique ability to understand, prepare, and defend against the ever-changing landscape of cybersecurity. Exodus also provides customers with actionable threat intelligence including deep vulnerability analysis, detection and mitigation guidance, and tooling to test defenses.  
]]></description>
      <pubDate>Wed, 11 May 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/answer-the-white-house-call-to-action-increase-cyber-defense-with-exodus-intelligence-Fk2IiYyk</link>
      <enclosure length="39566618" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d4266ce0-13ec-4225-bf4f-0671cc1eb76c/audio/d7c1fbe5-779e-45bf-afec-d42bc2021ef7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Answer the White House Call to Action – Increase Cyber Defense with Exodus Intelligence</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:41:12</itunes:duration>
      <itunes:summary>Exodus Intelligence employs some of the world&apos;s most advanced reverse-engineers and exploit developers to provide government agencies the unique ability to understand, prepare, and defend against the ever-changing landscape of cybersecurity. Exodus also provides customers with actionable threat intelligence including deep vulnerability analysis, detection and mitigation guidance, and tooling to test defenses. </itunes:summary>
      <itunes:subtitle>Exodus Intelligence employs some of the world&apos;s most advanced reverse-engineers and exploit developers to provide government agencies the unique ability to understand, prepare, and defend against the ever-changing landscape of cybersecurity. Exodus also provides customers with actionable threat intelligence including deep vulnerability analysis, detection and mitigation guidance, and tooling to test defenses. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>158</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40bc92ee-8632-4345-bc2e-eba2f3099cc6</guid>
      <title>A Zero Trust Approach to Secure Operational Technology Systems</title>
      <description><![CDATA[In this podcast, our panel highlights the value of IT/OT convergence, and its impact on the practitioners across the security community. Topics covered in this session include the benefits of comprehensive OT security training, the OT lessons learned from the Log4j vulnerability, and what first steps to take on your convergence journey. 
]]></description>
      <pubDate>Tue, 19 Apr 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, BeyondTrust, Tenable)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/a-zero-trust-approach-to-secure-operational-technology-systems-3gK91pE_</link>
      <enclosure length="16311369" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/bd38668b-baa3-4163-8728-961378cbd05c/audio/85060824-8a25-413b-a38f-57fef754a4f1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A Zero Trust Approach to Secure Operational Technology Systems</itunes:title>
      <itunes:author>Carahsoft, BeyondTrust, Tenable</itunes:author>
      <itunes:duration>00:16:59</itunes:duration>
      <itunes:summary>In this podcast, our panel highlights the value of IT/OT convergence, and its impact on the practitioners across the security community. Topics covered in this session include the benefits of comprehensive OT security training, the OT lessons learned from the Log4j vulnerability, and what first steps to take on your convergence journey.</itunes:summary>
      <itunes:subtitle>In this podcast, our panel highlights the value of IT/OT convergence, and its impact on the practitioners across the security community. Topics covered in this session include the benefits of comprehensive OT security training, the OT lessons learned from the Log4j vulnerability, and what first steps to take on your convergence journey.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>156</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">83ab5d0a-6b84-4449-ab0c-831aeab2b5ae</guid>
      <title>Waterfall Podcast Series Ep.1: Critical Infrastructures: Recent Attacks, Near-Term Projections, and How to Prepare</title>
      <description><![CDATA[<p>Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, joined Carahsoft to discuss Critical (Industrial) Infrastructures, Recent Attacks, Near-Term Projections, and How to Prepare. </p><p>SUBSCRIBE to get the latest tech tips & tricks from industry leaders!<br /><a href="https://www.youtube.com/user/carahtechtv">https://www.youtube.com/user/carahtechtv</a></p><p>FOLLOW US ON TWITTER:<br /><a href="https://twitter.com/Carahsoft">https://twitter.com/Carahsoft</a></p><p>CONNECT WITH US ON LINKEDIN:<br /><a href="https://www.linkedin.com/company/cara">https://www.linkedin.com/company/cara</a>...</p><p>LIKE US ON FACEBOOK:<br /><a href="https://www.facebook.com/carahsoft">https://www.facebook.com/carahsoft</a></p><p>LISTEN TO US ON OUR CARAHCAST CHANNEL:<br /><a href="https://www.carahsoft.com/carahcast">https://www.carahsoft.com/carahcast</a></p><p>READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS:<br /><a href="https://www.carahsoft.com/community">https://www.carahsoft.com/community</a></p>
]]></description>
      <pubDate>Fri, 8 Apr 2022 20:48:29 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/waterfall-podcast-series-ep1-critical-infrastructures-recent-attacks-near-term-projections-and-how-to-prepare-I3rtQc89</link>
      <content:encoded><![CDATA[<p>Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, joined Carahsoft to discuss Critical (Industrial) Infrastructures, Recent Attacks, Near-Term Projections, and How to Prepare. </p><p>SUBSCRIBE to get the latest tech tips & tricks from industry leaders!<br /><a href="https://www.youtube.com/user/carahtechtv">https://www.youtube.com/user/carahtechtv</a></p><p>FOLLOW US ON TWITTER:<br /><a href="https://twitter.com/Carahsoft">https://twitter.com/Carahsoft</a></p><p>CONNECT WITH US ON LINKEDIN:<br /><a href="https://www.linkedin.com/company/cara">https://www.linkedin.com/company/cara</a>...</p><p>LIKE US ON FACEBOOK:<br /><a href="https://www.facebook.com/carahsoft">https://www.facebook.com/carahsoft</a></p><p>LISTEN TO US ON OUR CARAHCAST CHANNEL:<br /><a href="https://www.carahsoft.com/carahcast">https://www.carahsoft.com/carahcast</a></p><p>READ THE LATEST GOVERNMENT TECH COMMUNITY TRENDS:<br /><a href="https://www.carahsoft.com/community">https://www.carahsoft.com/community</a></p>
]]></content:encoded>
      <enclosure length="24280980" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/39113830-84a4-4534-814d-167ee6d88478/audio/cc880600-a155-4301-90e4-073f66af831b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Waterfall Podcast Series Ep.1: Critical Infrastructures: Recent Attacks, Near-Term Projections, and How to Prepare</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:25:17</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>155</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d3321e2-ce5b-425d-af60-3c94603a5530</guid>
      <title>The Four Cornerstones of a Successful Procure-to-Pay Transformation with Coupa</title>
      <description><![CDATA[In this podcast, Eric Williams, AVP of Supply Chain Management at University of Texas (UT) Health Houston, discussed how to collaborate with staff and stakeholders for mutual success. Attendees learned about his four cornerstones of a successful Procure-to-Pay (P2P) transformation and how he used change management to drive value for UT Health. 
]]></description>
      <pubDate>Thu, 7 Apr 2022 18:21:37 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Coupa)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-four-cornerstones-of-a-successful-procure-to-pay-transformation-with-coupa-cK6ZkxGj</link>
      <enclosure length="26375700" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/79b9f859-dfce-4c3c-b609-580940822854/audio/c642e66a-a0fb-40c3-8494-f131a56d65a8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Four Cornerstones of a Successful Procure-to-Pay Transformation with Coupa</itunes:title>
      <itunes:author>Carahsoft, Coupa</itunes:author>
      <itunes:duration>00:27:28</itunes:duration>
      <itunes:summary>In this podcast, Eric Williams, AVP of Supply Chain Management at University of Texas (UT) Health Houston, discussed how to collaborate with staff and stakeholders for mutual success. Attendees learned about his four cornerstones of a successful Procure-to-Pay (P2P) transformation and how he used change management to drive value for UT Health.</itunes:summary>
      <itunes:subtitle>In this podcast, Eric Williams, AVP of Supply Chain Management at University of Texas (UT) Health Houston, discussed how to collaborate with staff and stakeholders for mutual success. Attendees learned about his four cornerstones of a successful Procure-to-Pay (P2P) transformation and how he used change management to drive value for UT Health.</itunes:subtitle>
      <itunes:keywords>customers, customer service, computer, users, suppliers, platform, software, cloud, contract, money, process, technology, tech, collaborate, it, procedure, catalog, pay, supply chain, collaboration, spend, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>155</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bed26726-b670-4882-8520-71247a2b2a44</guid>
      <title>The State of the Phishing Landscape: Why Being Intelligence Led, Human Reporting + AI are a Must to Protect Your Agency</title>
      <description><![CDATA[Listen in and hear how agencies can be equipped with solutions to quickly find, respond to, and remediate phishing attacks in real-time by combining the power of human reporting and high-fidelity AI & machine learning. 
]]></description>
      <pubDate>Thu, 24 Mar 2022 13:25:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Cofense, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-state-of-the-phishing-landscape-why-being-intelligence-led-human-reporting-ai-are-a-must-to-protect-your-agency-SJIdIKuu</link>
      <enclosure length="42281803" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c8f9ea88-75e3-4e24-a2ce-aa59b49072bb/audio/789debb3-41fe-4352-8a18-5fe5ebc58514/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The State of the Phishing Landscape: Why Being Intelligence Led, Human Reporting + AI are a Must to Protect Your Agency</itunes:title>
      <itunes:author>Cofense, Carahsoft</itunes:author>
      <itunes:duration>00:44:02</itunes:duration>
      <itunes:summary>Listen in and hear how agencies can be equipped with solutions to quickly find, respond to, and remediate phishing attacks in real-time by combining the power of human reporting and high-fidelity AI &amp; machine learning.</itunes:summary>
      <itunes:subtitle>Listen in and hear how agencies can be equipped with solutions to quickly find, respond to, and remediate phishing attacks in real-time by combining the power of human reporting and high-fidelity AI &amp; machine learning.</itunes:subtitle>
      <itunes:keywords>customers, computer, users, software, phish, technology, phishing, intel, threat, threat actors, defense, report, it, public sector, threat intelligence, target, campaigns, email, cybersecurity, security, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>154</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fb2e140f-9c79-44f7-860c-ccaba9cc275d</guid>
      <title>&quot;But we&apos;ve always done it this way.&quot;— New Cybersecurity for Federal Agencies</title>
      <description><![CDATA[Join Blackberry and Carahsoft for a podcast on new cybersecurity for federal agencies. Today, federal agencies are challenged with prioritizing the data security and privacy of the American people and government amid an increasingly sophisticated threat landscape. The Cybersecurity Executive Order (CSEO) charges, “...the Federal government should lead in cybersecurity...” However, the past approach – adding additional layers to an already overly complex and unmanageable security infrastructure, managed by too few resources – is not sustainable. A new perspective is required to keep up, and ahead, of cyber adversaries today and in the future. During this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry we will explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity – or having a bigger team – does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results. 
]]></description>
      <pubDate>Mon, 21 Mar 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/but-weve-always-done-it-this-way-new-cybersecurity-for-federal-agencies-2cr_S9Fm</link>
      <enclosure length="34883236" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ab32b962-c06f-42b1-878a-173bf558d777/audio/9664b79f-2e91-40bd-958e-4f2a7c798f49/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>&quot;But we&apos;ve always done it this way.&quot;— New Cybersecurity for Federal Agencies</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:36:20</itunes:duration>
      <itunes:summary>Join Blackberry and Carahsoft for a podcast on new cybersecurity for federal agencies. Today, federal agencies are challenged with prioritizing the data security and privacy of the American people and government amid an increasingly sophisticated threat landscape. The Cybersecurity Executive Order (CSEO) charges, “...the Federal government should lead in cybersecurity...” However, the past approach – adding additional layers to an already overly complex and unmanageable security infrastructure, managed by too few resources – is not sustainable. A new perspective is required to keep up, and ahead, of cyber adversaries today and in the future. During this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry we will explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity – or having a bigger team – does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results.</itunes:summary>
      <itunes:subtitle>Join Blackberry and Carahsoft for a podcast on new cybersecurity for federal agencies. Today, federal agencies are challenged with prioritizing the data security and privacy of the American people and government amid an increasingly sophisticated threat landscape. The Cybersecurity Executive Order (CSEO) charges, “...the Federal government should lead in cybersecurity...” However, the past approach – adding additional layers to an already overly complex and unmanageable security infrastructure, managed by too few resources – is not sustainable. A new perspective is required to keep up, and ahead, of cyber adversaries today and in the future. During this insightful session with Roger Sels, Vice President, Cybersecurity Solutions, BlackBerry we will explore: How chaos in the field of cybersecurity has led to negative business outcomes Why spending more on cybersecurity – or having a bigger team – does not equate to increased protection New ways agencies can drive outcomes and increase security posture with measurable results.</itunes:subtitle>
      <itunes:keywords>carahsoft, roger sels, blackberry, agencies, cseo, carahcast, federal, cybersecurity solutions, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>153</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9248f5ba-1704-4806-ad17-cc3384657f4b</guid>
      <title>Operation Work Safer: Eliminate Threats and Protect Against Cyber Terrorism with Google Cloud</title>
      <description><![CDATA[Google is bringing the best of their products and cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud's Work Safer program enables public sector organizations to securely collaborate and communicate in hybrid work environments. 
]]></description>
      <pubDate>Fri, 18 Mar 2022 13:17:18 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (MediaAgility, Carahsoft, Google Cloud)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/operation-work-safer-eliminate-threats-and-protect-against-cyber-terrorism-with-google-cloud-KBd1ssXU</link>
      <enclosure length="40475835" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e78eed82-2f08-43ea-87e9-d25b696db231/audio/ddde8ba5-2c8c-459e-ae00-3983cfb8ba55/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Operation Work Safer: Eliminate Threats and Protect Against Cyber Terrorism with Google Cloud</itunes:title>
      <itunes:author>MediaAgility, Carahsoft, Google Cloud</itunes:author>
      <itunes:duration>00:42:09</itunes:duration>
      <itunes:summary>Google is bringing the best of their products and cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud&apos;s Work Safer program enables public sector organizations to securely collaborate and communicate in hybrid work environments.</itunes:summary>
      <itunes:subtitle>Google is bringing the best of their products and cybersecurity partners to help protect against malware, phishing, ransomware, and other cyberattacks. Google Cloud&apos;s Work Safer program enables public sector organizations to securely collaborate and communicate in hybrid work environments.</itunes:subtitle>
      <itunes:keywords>computer, users, organization, trust, software, protect, google, partners, objective, cloud, secure, phishing, tools, intel, data, device, core, it, workspace, attack, email, cybersecurity, security, enterprise</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>152</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0177a014-d8f6-4e9c-9e55-9585fb035954</guid>
      <title>Mission First Podcast Series: The Government IT Supply Chain, Explained</title>
      <description><![CDATA[<p>Watch episode three of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products.</p><p>During this session, Keith Nakasone, former deputy assistant commissioner of acquisition management within the information technology office at the General Services Administration’s (GSA) Federal Acquisition Service and <i>Federal Strategist</i>, VMware and Craig Bowman, <i>Sr. Director - Federal</i>, VMware, will discuss: </p><ul><li>Changes needed in the acquisition space to stay aligned with cloud modernization efforts</li><li>How cybersecurity measures are changing to address increased concerns and supply chain risks</li><li>U.S Government priorities in the new year, including moving to the hybrid cloud, supporting small businesses, and increasing work-from-anywhere capabilities</li></ul>
]]></description>
      <pubDate>Wed, 16 Mar 2022 20:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware, Carahsoft, Craig Bowman, Keith Nakasone)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-podcast-series-the-government-it-supply-chain-explained-ZShKI7kw</link>
      <content:encoded><![CDATA[<p>Watch episode three of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products.</p><p>During this session, Keith Nakasone, former deputy assistant commissioner of acquisition management within the information technology office at the General Services Administration’s (GSA) Federal Acquisition Service and <i>Federal Strategist</i>, VMware and Craig Bowman, <i>Sr. Director - Federal</i>, VMware, will discuss: </p><ul><li>Changes needed in the acquisition space to stay aligned with cloud modernization efforts</li><li>How cybersecurity measures are changing to address increased concerns and supply chain risks</li><li>U.S Government priorities in the new year, including moving to the hybrid cloud, supporting small businesses, and increasing work-from-anywhere capabilities</li></ul>
]]></content:encoded>
      <enclosure length="32009068" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ffca5dd8-aabf-443d-939d-89cf273325d5/audio/e586847e-7efd-4af1-a34d-dd87a789acca/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First Podcast Series: The Government IT Supply Chain, Explained</itunes:title>
      <itunes:author>VMware, Carahsoft, Craig Bowman, Keith Nakasone</itunes:author>
      <itunes:duration>00:33:20</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>it supply chain, mission, thought leaders, government it, acquisition, mission first, dod agencies, work-from-anywhere, hybrid cloud, government it supply chain, it buzzwords, supporting small businesses, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>151</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">132e1551-6b38-498b-8472-fcba24d58431</guid>
      <title>CXO Cheat Sheet: Complying with the Federal Zero Trust Strategy</title>
      <description><![CDATA[With the release of OMB’s Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. Listen to the expert panel including former Federal CISO, Danny Connelly, as they discuss pitfalls to avoid when implementing OMB’s required actions and how to quickly comply with the strategy requirements without cutting corners.  
]]></description>
      <pubDate>Tue, 15 Mar 2022 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cxo-cheat-sheet-complying-with-the-federal-zero-trust-strategy-3M2s6YQb</link>
      <enclosure length="42910543" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6eca9354-6071-4ad9-8bdb-85ee83ab0ce2/audio/2a8cd209-6df0-4377-8e1a-7003b7257ce6/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>CXO Cheat Sheet: Complying with the Federal Zero Trust Strategy</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:44:41</itunes:duration>
      <itunes:summary>With the release of OMB’s Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. Listen to the expert panel including former Federal CISO, Danny Connelly, as they discuss pitfalls to avoid when implementing OMB’s required actions and how to quickly comply with the strategy requirements without cutting corners. </itunes:summary>
      <itunes:subtitle>With the release of OMB’s Federal Zero Trust Strategy on January 26, 2022, agencies now have guidelines for achieving the Zero Trust mandates of the Cybersecurity Executive Order. Listen to the expert panel including former Federal CISO, Danny Connelly, as they discuss pitfalls to avoid when implementing OMB’s required actions and how to quickly comply with the strategy requirements without cutting corners. </itunes:subtitle>
      <itunes:keywords>carahsoft, executive order, omb, zero trust, danny connelly, federal, cxo, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>150</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f5fd0607-9af0-4fd1-801d-4fa4b731c45b</guid>
      <title>You Can&apos;t Secure What You Can&apos;t See: Apply TruContext™ to Your Splunk Data with Visium Analytics</title>
      <description><![CDATA[In Visium’s newest podcast, Jesse Jones, Chief Architect at Visium Analytics and Joel Kelly, Director of Special Projects, joined us to provide an understanding on how TruContext™ enriches your Splunk processed data with an intuitive topological type view of the relationships amongst disparate data points. 
]]></description>
      <pubDate>Fri, 4 Mar 2022 19:27:03 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Visium Analytics, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/you-cant-secure-what-you-cant-see-apply-trucontext-to-your-splunk-data-with-visium-analytics-6L2FIRoS</link>
      <enclosure length="27778969" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/92c24491-a7b6-4742-95a3-1fcd35f3f730/audio/afc645e1-f86c-4382-a6d0-7286d7cb7412/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>You Can&apos;t Secure What You Can&apos;t See: Apply TruContext™ to Your Splunk Data with Visium Analytics</itunes:title>
      <itunes:author>Visium Analytics, Carahsoft</itunes:author>
      <itunes:duration>00:28:53</itunes:duration>
      <itunes:summary>In Visium’s newest podcast, Jesse Jones, Chief Architect at Visium Analytics and Joel Kelly, Director of Special Projects, joined us to provide an understanding on how TruContext™ enriches your Splunk processed data with an intuitive topological type view of the relationships amongst disparate data points.</itunes:summary>
      <itunes:subtitle>In Visium’s newest podcast, Jesse Jones, Chief Architect at Visium Analytics and Joel Kelly, Director of Special Projects, joined us to provide an understanding on how TruContext™ enriches your Splunk processed data with an intuitive topological type view of the relationships amongst disparate data points.</itunes:subtitle>
      <itunes:keywords>storage, system, computer, splunk, software, graph, trucontext, relationships, cloud, technology, tools, data, it, visium analytics, compromised, content, cybersecurity, visium, enterprise</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>149</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">18aae06f-f34d-4e55-b736-81a81bcaf9e2</guid>
      <title>Mission First Podcast Series: Kessel Run and Continuous Authority to Operate</title>
      <description><![CDATA[<p>Watch episode two of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. During this session, Jeremiah Sanders, Co-Founder of Kessel Run and Senior Federal Strategist, VMware and Alex Barbato, Senior Engineer, VMware Tanzu discuss: </p><ul><li>Continuous ATO and how has it evolved into Continuous Risk Management Framework</li><li>The evolution of Kessel Run and how it set the stage for Continuous ATO in DoD agencies</li><li>How agencies can begin the process and achieve Continuous ATO</li><li>and more!</li></ul><p>Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.</p>
]]></description>
      <pubDate>Wed, 9 Feb 2022 20:59:49 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware, Craig Bowman, Jeremiah Sanders, Alex Barbato)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-podcast-series-kessel-run-and-continuous-authority-to-operate-VunD6U5y</link>
      <content:encoded><![CDATA[<p>Watch episode two of Mission First, our Department of Defense (DoD) and National Security podcast series focusing on the mission, not products. During this session, Jeremiah Sanders, Co-Founder of Kessel Run and Senior Federal Strategist, VMware and Alex Barbato, Senior Engineer, VMware Tanzu discuss: </p><ul><li>Continuous ATO and how has it evolved into Continuous Risk Management Framework</li><li>The evolution of Kessel Run and how it set the stage for Continuous ATO in DoD agencies</li><li>How agencies can begin the process and achieve Continuous ATO</li><li>and more!</li></ul><p>Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT.</p>
]]></content:encoded>
      <enclosure length="50526937" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/952d0879-5176-4117-a821-4f3312145153/audio/a0196fd9-d753-4c42-8481-007eaab81791/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First Podcast Series: Kessel Run and Continuous Authority to Operate</itunes:title>
      <itunes:author>Carahsoft, VMware, Craig Bowman, Jeremiah Sanders, Alex Barbato</itunes:author>
      <itunes:duration>00:52:17</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>mission, thought leaders, mission first, dod agencies, vmware, kessel run, federal government it, continuous ato, national security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>148</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fbe7a335-f490-4d9c-a34e-4f5fba756df2</guid>
      <title>Learn About the Benefits and Updates of Your VMware Renewals</title>
      <description><![CDATA[Start the new year right with VMware! Tune in to hear Lindy Christian, VMware’s Channel Engagement Manager, as she discusses the benefits and updates of renewing your VMware subscriptions. 
]]></description>
      <pubDate>Tue, 25 Jan 2022 18:12:22 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/learn-about-the-benefits-and-updates-of-your-vmware-renewals-3l84V9AG</link>
      <enclosure length="9270241" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e8290f42-7c84-453b-8617-046a318eee4d/audio/797fc1f5-cdfe-49b8-aff4-29c4d5248d39/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Learn About the Benefits and Updates of Your VMware Renewals</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:09:37</itunes:duration>
      <itunes:summary>Start the new year right with VMware! Tune in to hear Lindy Christian, VMware’s Channel Engagement Manager, as she discusses the benefits and updates of renewing your VMware subscriptions.</itunes:summary>
      <itunes:subtitle>Start the new year right with VMware! Tune in to hear Lindy Christian, VMware’s Channel Engagement Manager, as she discusses the benefits and updates of renewing your VMware subscriptions.</itunes:subtitle>
      <itunes:keywords>customers, computer, updates, software, cloud, renewals, government, technology, renewal, reinstatement, intel, it, vmware, federal, maintaining, fees, subscription, cybersecurity, security, expiration, support</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>146</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">851b2deb-28b2-4b5f-bb1a-64d61bfafb32</guid>
      <title>Secure Collaboration in M365 within a Zero Trust Lens with AvePoint</title>
      <description><![CDATA[Stream AvePoint's new podcast to learn how federal agencies can leverage Microsoft 365’s collaborative power using a Zero Trust model. Topics discussed include automating policy enforcement at the workspace (Teams, SharePoint, and M365 Groups), workspace compliance, lifecycle, and permissions recertification based on data sensitivity, and intelligent reporting of exposure risk based on sensitive information types and permissions data.  
]]></description>
      <pubDate>Tue, 25 Jan 2022 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AvePoint, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/secure-collaboration-in-m365-within-a-zero-trust-lens-with-avepoint-YtVW4IF0</link>
      <enclosure length="46850392" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/47f1ceff-8c32-4fbd-9983-b76e80034be5/audio/983a916a-c3cb-4aaf-b0d0-df760a58b6b4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Secure Collaboration in M365 within a Zero Trust Lens with AvePoint</itunes:title>
      <itunes:author>AvePoint, Carahsoft</itunes:author>
      <itunes:duration>00:48:49</itunes:duration>
      <itunes:summary>Stream AvePoint&apos;s new podcast to learn how federal agencies can leverage Microsoft 365’s collaborative power using a Zero Trust model. Topics discussed include automating policy enforcement at the workspace (Teams, SharePoint, and M365 Groups), workspace compliance, lifecycle, and permissions recertification based on data sensitivity, and intelligent reporting of exposure risk based on sensitive information types and permissions data. </itunes:summary>
      <itunes:subtitle>Stream AvePoint&apos;s new podcast to learn how federal agencies can leverage Microsoft 365’s collaborative power using a Zero Trust model. Topics discussed include automating policy enforcement at the workspace (Teams, SharePoint, and M365 Groups), workspace compliance, lifecycle, and permissions recertification based on data sensitivity, and intelligent reporting of exposure risk based on sensitive information types and permissions data. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>147</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">35310827-92d6-43a2-9e54-4a4995040c49</guid>
      <title>The Future Begins Now with VMware Carbon Black</title>
      <description><![CDATA[The Biden Administration has issued an Executive Order mandating all government agencies to deploy an endpoint detection and response (EDR) program to protect their data. To protect yours, trust only the most-deployed threat hunting tool in the U.S. government: VMware Carbon Black. 
]]></description>
      <pubDate>Fri, 14 Jan 2022 16:16:36 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware, VMware Carbon Black)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-future-begins-now-with-vmware-carbon-black-SMpv8tKe</link>
      <enclosure length="51209725" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/02fd2a09-4fb6-4b38-997e-46f24d9562a4/audio/36b1dc2b-5598-48de-a96a-5017cc3ab430/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Future Begins Now with VMware Carbon Black</itunes:title>
      <itunes:author>Carahsoft, VMware, VMware Carbon Black</itunes:author>
      <itunes:duration>00:53:18</itunes:duration>
      <itunes:summary>The Biden Administration has issued an Executive Order mandating all government agencies to deploy an endpoint detection and response (EDR) program to protect their data. To protect yours, trust only the most-deployed threat hunting tool in the U.S. government: VMware Carbon Black.</itunes:summary>
      <itunes:subtitle>The Biden Administration has issued an Executive Order mandating all government agencies to deploy an endpoint detection and response (EDR) program to protect their data. To protect yours, trust only the most-deployed threat hunting tool in the U.S. government: VMware Carbon Black.</itunes:subtitle>
      <itunes:keywords>carbon black, endpoint detection and response, server, computer, carbon, biden, software, mdr, executive order, visibility, detection, government, cyberthreat, environment, intel, threat, malware, it, edr, vmware, target, cybersecurity, ransomware, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>145</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">84c22b6a-af50-4a5e-bb51-1f5d8d14f322</guid>
      <title>Cybersecurity Executive Order: 10 Database Security Best Practices to Help Meet Mandates with Trustwave</title>
      <description><![CDATA[Listen to experts discuss database security best practices to assist in meeting the Presidential Executive Order on Cybersecurity. 
]]></description>
      <pubDate>Tue, 11 Jan 2022 16:52:26 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Trustwave)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cybersecurity-executive-order-10-database-security-best-practices-to-help-meet-mandates-with-trustwave-C_togfUN</link>
      <enclosure length="31965935" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/33cc1343-ece6-4eb7-8362-65e46b0488ca/audio/5a819b40-0b50-4589-8b70-735c552aeced/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cybersecurity Executive Order: 10 Database Security Best Practices to Help Meet Mandates with Trustwave</itunes:title>
      <itunes:author>Carahsoft, Trustwave</itunes:author>
      <itunes:duration>00:33:15</itunes:duration>
      <itunes:summary>Listen to experts discuss database security best practices to assist in meeting the Presidential Executive Order on Cybersecurity.</itunes:summary>
      <itunes:subtitle>Listen to experts discuss database security best practices to assist in meeting the Presidential Executive Order on Cybersecurity.</itunes:subtitle>
      <itunes:keywords>biden, software, executive order, user, protect, network, database, government, privilege, environment, data, agencies, access, it, cybersecurity, security, policies</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>144</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4b122458-2273-425c-aa17-7144e2f1978c</guid>
      <title>Mission First Podcast Series: Kubernetes 2.0</title>
      <description><![CDATA[<p>Hear this conversation between Joe Beda, <i>Co-creator of Kubernetes and Principal Engineer, </i>VMware and Paul Puckett, <i>Director of the Enterprise Cloud Management Office (ECMO)</i>, U.S. Army where they discuss:</p><ul><li>The development Kubernetes and when Joe realized it would be a part of every major software conversation globally</li><li>Key trends, practices, and differences happening in the public sector versus private</li><li>How Kubernetes helps manage Day 2 complexities of applications spanning from cloud service providers (CSP's), datacenters, and to the edge</li><li>and much more...</li></ul><p>Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT. </p>
]]></description>
      <pubDate>Wed, 5 Jan 2022 20:30:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/mission-first-podcast-series-kubernetes-20-LKSB1pDT</link>
      <content:encoded><![CDATA[<p>Hear this conversation between Joe Beda, <i>Co-creator of Kubernetes and Principal Engineer, </i>VMware and Paul Puckett, <i>Director of the Enterprise Cloud Management Office (ECMO)</i>, U.S. Army where they discuss:</p><ul><li>The development Kubernetes and when Joe realized it would be a part of every major software conversation globally</li><li>Key trends, practices, and differences happening in the public sector versus private</li><li>How Kubernetes helps manage Day 2 complexities of applications spanning from cloud service providers (CSP's), datacenters, and to the edge</li><li>and much more...</li></ul><p>Tune into our monthly podcast series, Mission First, where we will be focusing on the Department of Defense and National Security mission and not products. Hear from thought-leaders in the industry as they discuss complex challenges and topics buzzing within federal government IT. </p>
]]></content:encoded>
      <enclosure length="55496925" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c96e9cfe-a684-410e-a298-46508dded369/audio/d2dc53df-7ee4-4723-979e-927c55d4070c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Mission First Podcast Series: Kubernetes 2.0</itunes:title>
      <itunes:author>VMware, Carahsoft</itunes:author>
      <itunes:duration>00:57:48</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>mission, mission first, kubernetes, first</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>143</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13296e82-a8b7-4cbe-ab16-676691de5309</guid>
      <title>10 Cybersecurity Best Practices Ransomware Fears Most</title>
      <description><![CDATA[The headlines are staggering. Hospitals and healthcare systems are struggling to protect against ransomware attacks, resulting in longer patient stays, delays in procedures, and ultimately, an increase in patient deaths. Although ransomware can cause serious damage, it’s not invincible. In fact, it’s only as strong as your organization’s weakest link. Why not turn the table on ransomware hackers for good? Veritas Healthcare CTO, Rick Bryant, explained the top 10 best practices your hospital or healthcare system can implement today to create a multi-layered, flexible, unified defense strategy that will ensure resilience and eliminate the risks to patient care. 
]]></description>
      <pubDate>Wed, 1 Dec 2021 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/10-cybersecurity-best-practices-ransomware-fears-most-bmidoDiQ</link>
      <enclosure length="38168887" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/30912b0f-41a7-4592-8bbd-3fd8de1c7f6d/audio/970025be-32dd-4c47-a1c3-99bd47cf3b29/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>10 Cybersecurity Best Practices Ransomware Fears Most</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:39:45</itunes:duration>
      <itunes:summary>The headlines are staggering. Hospitals and healthcare systems are struggling to protect against ransomware attacks, resulting in longer patient stays, delays in procedures, and ultimately, an increase in patient deaths. Although ransomware can cause serious damage, it’s not invincible. In fact, it’s only as strong as your organization’s weakest link. Why not turn the table on ransomware hackers for good? Veritas Healthcare CTO, Rick Bryant, explained the top 10 best practices your hospital or healthcare system can implement today to create a multi-layered, flexible, unified defense strategy that will ensure resilience and eliminate the risks to patient care.</itunes:summary>
      <itunes:subtitle>The headlines are staggering. Hospitals and healthcare systems are struggling to protect against ransomware attacks, resulting in longer patient stays, delays in procedures, and ultimately, an increase in patient deaths. Although ransomware can cause serious damage, it’s not invincible. In fact, it’s only as strong as your organization’s weakest link. Why not turn the table on ransomware hackers for good? Veritas Healthcare CTO, Rick Bryant, explained the top 10 best practices your hospital or healthcare system can implement today to create a multi-layered, flexible, unified defense strategy that will ensure resilience and eliminate the risks to patient care.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>142</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">73693f2c-f24b-48ec-9348-7438f23e4fbc</guid>
      <title>Phishing with VMware</title>
      <description><![CDATA[Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other attacks, such as ransomware. 
]]></description>
      <pubDate>Thu, 28 Oct 2021 17:25:20 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware, Carahsoft, FedInsider)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/phishing-with-vmware-nvs3Oget</link>
      <enclosure length="50642013" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/13d79fad-09c1-4d4d-9a89-0de2e7612c07/audio/5720f67f-c88c-4f29-aabc-6ab68399e763/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Phishing with VMware</itunes:title>
      <itunes:author>VMware, Carahsoft, FedInsider</itunes:author>
      <itunes:duration>00:52:41</itunes:duration>
      <itunes:summary>Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other attacks, such as ransomware.</itunes:summary>
      <itunes:subtitle>Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other attacks, such as ransomware.</itunes:subtitle>
      <itunes:keywords>computer, software, user, cloud, government, phishing, threat, cyber, it, attack, federal, email, cybersecurity, security, phishing attack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>141</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3f2dc83e-f0d8-434e-a8ed-ca65e43fae24</guid>
      <title>Blockchain Security with Chainalysis</title>
      <description><![CDATA[Blockchain is most commonly considered the foundation for cryptocurrency – the usual form of payment by ransomware demands – because it is a method of recording information that makes it difficult to impossible to change, hack, or cheat records of transactions. It’s a form of “distributed ledger” that records every transaction to every participant’s copy of that ledger. As a result, blockchain holds great potential to provide high levels of security for government agencies, provided they understand that transparency of transactions also is one of its characteristics. 
]]></description>
      <pubDate>Thu, 28 Oct 2021 17:19:19 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Chainalysis, FedInsider)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/blockchain-security-with-chainalysis-orYopUaQ</link>
      <enclosure length="47008758" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/32d80ba8-47ba-4f2f-95dd-ae607281d278/audio/43ac8a8b-8f2a-45b2-9f3f-cbb6963cee1c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Blockchain Security with Chainalysis</itunes:title>
      <itunes:author>Carahsoft, Chainalysis, FedInsider</itunes:author>
      <itunes:duration>00:48:56</itunes:duration>
      <itunes:summary>Blockchain is most commonly considered the foundation for cryptocurrency – the usual form of payment by ransomware demands – because it is a method of recording information that makes it difficult to impossible to change, hack, or cheat records of transactions. It’s a form of “distributed ledger” that records every transaction to every participant’s copy of that ledger. As a result, blockchain holds great potential to provide high levels of security for government agencies, provided they understand that transparency of transactions also is one of its characteristics.</itunes:summary>
      <itunes:subtitle>Blockchain is most commonly considered the foundation for cryptocurrency – the usual form of payment by ransomware demands – because it is a method of recording information that makes it difficult to impossible to change, hack, or cheat records of transactions. It’s a form of “distributed ledger” that records every transaction to every participant’s copy of that ledger. As a result, blockchain holds great potential to provide high levels of security for government agencies, provided they understand that transparency of transactions also is one of its characteristics.</itunes:subtitle>
      <itunes:keywords>blockchain, computer, state, software, cryptocurrency, secure, government, chain, technology, data, cyber, application, it, attack, federal, crypto, integrity, local governments, records, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>140</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b04399bf-a1e7-46e1-9d28-efa1935bc995</guid>
      <title>Securing the Supply Chain with IronNet Cybersecurity</title>
      <description><![CDATA[In the end, any IT system is only as secure as its various components. Federal, state, and local agencies have learned that the hard way, as software platform and application providers have been hacked as a way to get into government systems. The Executive Order on Improving the Nation's Cybersecurity issued by the White House in May dedicates Section 4 to the topic of enhancing the security of the software supply chain. 
]]></description>
      <pubDate>Thu, 28 Oct 2021 17:14:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, IronNet Cybersecurity, FedInsider, vendor, services, attack, threat, resilience, secure, organization, government, federal)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/securing-the-supply-chain-with-ironnet-cybersecurity-ASXeAvzG</link>
      <enclosure length="39065617" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b76b3f93-4218-4a46-964f-9cd497fd5374/audio/01f44c99-0699-485b-a1e8-03de337fb9e0/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Securing the Supply Chain with IronNet Cybersecurity</itunes:title>
      <itunes:author>Carahsoft, IronNet Cybersecurity, FedInsider, vendor, services, attack, threat, resilience, secure, organization, government, federal</itunes:author>
      <itunes:duration>00:40:40</itunes:duration>
      <itunes:summary>In the end, any IT system is only as secure as its various components. Federal, state, and local agencies have learned that the hard way, as software platform and application providers have been hacked as a way to get into government systems. The Executive Order on Improving the Nation&apos;s Cybersecurity issued by the White House in May dedicates Section 4 to the topic of enhancing the security of the software supply chain.</itunes:summary>
      <itunes:subtitle>In the end, any IT system is only as secure as its various components. Federal, state, and local agencies have learned that the hard way, as software platform and application providers have been hacked as a way to get into government systems. The Executive Order on Improving the Nation&apos;s Cybersecurity issued by the White House in May dedicates Section 4 to the topic of enhancing the security of the software supply chain.</itunes:subtitle>
      <itunes:keywords>computer, software, government, it, supply chain, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>139</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db2460fd-cf44-4b0e-872d-10bb0b5239bd</guid>
      <title>Ransomware with Hewlett Packard Enterprise</title>
      <description><![CDATA[Ransomware cyberattacks vaulted into public awareness with a vengeance when an East Coast gasoline pipeline shut down for days, causing a shortage and long lines at the gas pump when drivers panicked. But hospitals, schools and local governments have been dealing with ransomware threats for some time. 
]]></description>
      <pubDate>Thu, 28 Oct 2021 17:09:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, FedInsider, Hewlett Packard Enterprise)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ransomware-with-hewlett-packard-enterprise-Lptw8izQ</link>
      <enclosure length="46921389" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c02752c2-8938-430d-a2e0-a71153a984d8/audio/0e1584ce-f518-466b-80e0-be07a33b417a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ransomware with Hewlett Packard Enterprise</itunes:title>
      <itunes:author>Carahsoft, FedInsider, Hewlett Packard Enterprise</itunes:author>
      <itunes:duration>00:48:50</itunes:duration>
      <itunes:summary>Ransomware cyberattacks vaulted into public awareness with a vengeance when an East Coast gasoline pipeline shut down for days, causing a shortage and long lines at the gas pump when drivers panicked. But hospitals, schools and local governments have been dealing with ransomware threats for some time.</itunes:summary>
      <itunes:subtitle>Ransomware cyberattacks vaulted into public awareness with a vengeance when an East Coast gasoline pipeline shut down for days, causing a shortage and long lines at the gas pump when drivers panicked. But hospitals, schools and local governments have been dealing with ransomware threats for some time.</itunes:subtitle>
      <itunes:keywords>computer, software, local, network, government, fbi, threat, data, report, gao, it, attack, agency, cybersecurity, ransomware, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>138</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6a470992-52a9-4dc5-9904-8652b89295ec</guid>
      <title>Modernization of Legacy Security Systems with CyCognito</title>
      <description><![CDATA[One of the biggest vulnerabilities state and local governments face is the huge installed base of legacy hardware and software. They are very expensive to maintain, draining resources that could be used to offer new, internet-based services. They often are riddled with security flaws, from bad code to unsecured ports –it’s next to impossible to keep up with all the patches that need to be implemented. 
]]></description>
      <pubDate>Thu, 28 Oct 2021 14:45:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, CyCognito, FedInsider)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernization-of-legacy-security-systems-with-cycognito-ewtB1gri</link>
      <enclosure length="49267278" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c8740e7e-fb1a-42c3-8be6-961b46853737/audio/155154e6-4b9a-4e69-b71a-2304075adcae/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernization of Legacy Security Systems with CyCognito</itunes:title>
      <itunes:author>Carahsoft, CyCognito, FedInsider</itunes:author>
      <itunes:duration>00:51:16</itunes:duration>
      <itunes:summary>One of the biggest vulnerabilities state and local governments face is the huge installed base of legacy hardware and software. They are very expensive to maintain, draining resources that could be used to offer new, internet-based services. They often are riddled with security flaws, from bad code to unsecured ports –it’s next to impossible to keep up with all the patches that need to be implemented.</itunes:summary>
      <itunes:subtitle>One of the biggest vulnerabilities state and local governments face is the huge installed base of legacy hardware and software. They are very expensive to maintain, draining resources that could be used to offer new, internet-based services. They often are riddled with security flaws, from bad code to unsecured ports –it’s next to impossible to keep up with all the patches that need to be implemented.</itunes:subtitle>
      <itunes:keywords>system, breach, cloud, government, modernization, legacy system, report, agencies, gao, it, attack, legacy, modernize, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>137</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0e45d8d7-3c1c-46d2-a568-15e929d74d9f</guid>
      <title>Securing DoD Enterprise Innovation with ICAM</title>
      <description><![CDATA[Listen to this podcast with BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, DISA, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government. 
]]></description>
      <pubDate>Thu, 16 Sep 2021 19:53:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (BeyondTrust, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/securing-dod-enterprise-innovation-with-icam-beyondtrust-kCvKlj5l</link>
      <enclosure length="49137397" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/72f399ef-c06e-43bc-ac82-158cf9a15d63/audio/17de3ea7-0cb4-4c81-8c5d-e02fd6f00c79/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Securing DoD Enterprise Innovation with ICAM</itunes:title>
      <itunes:author>BeyondTrust, Carahsoft</itunes:author>
      <itunes:duration>00:51:09</itunes:duration>
      <itunes:summary>Listen to this podcast with BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, DISA, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.</itunes:summary>
      <itunes:subtitle>Listen to this podcast with BeyondTrust, MG Joe Brendler, US Army (Ret.), and Stephen M. Wallace, DISA, to understand why Privileged Access Management (PAM) is integral to secure the adoption of emerging initiatives across the government.</itunes:subtitle>
      <itunes:keywords>trust, user, network, disa, government, zero trust, modernization, icam, privileged, thunderdome, access, it, pam, policy, management, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>136</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d22ec5a1-b268-4a2f-9df8-d916adfbbc53</guid>
      <title>Grow Your Business Faster with Simplified, Accelerated FedRAMP Compliance</title>
      <description><![CDATA[The FedRAMP ATO journey can be daunting for many Cloud Solutions Providers. From understanding the time and cost investments to understanding how to meet the compliance requirements, it can seem like a never-ending uphill battle. But there is a simpler, faster, cheaper way to achieve your FedRAMP ATO! 
]]></description>
      <pubDate>Fri, 10 Sep 2021 14:14:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (RGS, Rackspace Technology, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/grow-your-business-faster-with-simplified-accelerated-fedramp-compliance-7u_PlwKs</link>
      <enclosure length="45034588" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fa531f88-bc6a-4a4b-b7ca-79a1f25bae84/audio/40226ab2-26dd-4e5a-92ba-69f0939c8484/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Grow Your Business Faster with Simplified, Accelerated FedRAMP Compliance</itunes:title>
      <itunes:author>RGS, Rackspace Technology, Carahsoft</itunes:author>
      <itunes:duration>00:46:52</itunes:duration>
      <itunes:summary>The FedRAMP ATO journey can be daunting for many Cloud Solutions Providers. From understanding the time and cost investments to understanding how to meet the compliance requirements, it can seem like a never-ending uphill battle. But there is a simpler, faster, cheaper way to achieve your FedRAMP ATO!</itunes:summary>
      <itunes:subtitle>The FedRAMP ATO journey can be daunting for many Cloud Solutions Providers. From understanding the time and cost investments to understanding how to meet the compliance requirements, it can seem like a never-ending uphill battle. But there is a simpler, faster, cheaper way to achieve your FedRAMP ATO!</itunes:subtitle>
      <itunes:keywords>customers, aws, solutions, cloud, government, technology, application, it, compliance, federal, fedramp, cloud solutions, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>135</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c8491b80-ff50-4e7f-b81e-4fdceb3a771c</guid>
      <title>Jira Align: Unlock the Agility of Your Federal Agency</title>
      <description><![CDATA[In Atlassian's new podcast, Derek Huether, Public Sector Solution Engineer with Atlassian and Dan Wilson, Founding Member and Business Development Manager with RightStar discuss how Atlassian Jira Align creates a collaborative environment to ensure that federal agencies project performance goals are met. 
]]></description>
      <pubDate>Fri, 3 Sep 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/jira-align-unlock-the-agility-of-your-federal-agency-WRrl4Qe_</link>
      <enclosure length="36244501" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/3006b625-a5a4-4468-aa2a-4463081c29fa/audio/5dd32bd6-6159-4012-a150-6bfe509f35e2/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Jira Align: Unlock the Agility of Your Federal Agency</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:37:45</itunes:duration>
      <itunes:summary>In Atlassian&apos;s new podcast, Derek Huether, Public Sector Solution Engineer with Atlassian and Dan Wilson, Founding Member and Business Development Manager with RightStar discuss how Atlassian Jira Align creates a collaborative environment to ensure that federal agencies project performance goals are met.</itunes:summary>
      <itunes:subtitle>In Atlassian&apos;s new podcast, Derek Huether, Public Sector Solution Engineer with Atlassian and Dan Wilson, Founding Member and Business Development Manager with RightStar discuss how Atlassian Jira Align creates a collaborative environment to ensure that federal agencies project performance goals are met.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>134</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4b13cd6d-d3ee-4af4-8186-babf1fe8c163</guid>
      <title>Smart Cities: IoT Security</title>
      <description><![CDATA[Join us for a discussion on securing your devices as IoT becomes a foundational component of Smart Cities moving forward. 
]]></description>
      <pubDate>Fri, 27 Aug 2021 17:50:12 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Waterfall Security, Carahsoft, Tenable)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/smart-cities-iot-security-GjMlgwFP</link>
      <enclosure length="47842617" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/160a6c06-346f-4f31-8ebf-7e5e3a5f9218/audio/5341d64f-3ac9-47dc-8fe4-edc9d64c5f94/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Smart Cities: IoT Security</itunes:title>
      <itunes:author>Waterfall Security, Carahsoft, Tenable</itunes:author>
      <itunes:duration>00:49:46</itunes:duration>
      <itunes:summary>Join us for a discussion on securing your devices as IoT becomes a foundational component of Smart Cities moving forward.</itunes:summary>
      <itunes:subtitle>Join us for a discussion on securing your devices as IoT becomes a foundational component of Smart Cities moving forward.</itunes:subtitle>
      <itunes:keywords>computer, software, cloud, government, technology, iot, internet, it, federal, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>133</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">198622bd-5bc5-48c6-9e2a-337e65f0e73c</guid>
      <title>Smart Cities: Smart Governance</title>
      <description><![CDATA[In this podcast, we sit down with municipal IT managers and industry providers who have found a way to connect with citizens at the speed of now. Listen as panelists Akshay Malik of Philadelphia, Kevin Hood of Tableau, and Josh Green, representing Adobe, discuss how Philadelphia and other U.S. Smart Cities have improved interactions with citizens through data visualization and a streamlined user experience. 
]]></description>
      <pubDate>Tue, 17 Aug 2021 21:15:16 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Tableau Software, Adobe)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/smart-cities-smart-governance-EAR3Ug_F</link>
      <enclosure length="51479749" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/45908f74-1f6d-4d7c-874f-467fb1998b6b/audio/45d6f930-9d4d-4e69-a173-12e94e5f525d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Smart Cities: Smart Governance</itunes:title>
      <itunes:author>Carahsoft, Tableau Software, Adobe</itunes:author>
      <itunes:duration>00:53:35</itunes:duration>
      <itunes:summary>In this podcast, we sit down with municipal IT managers and industry providers who have found a way to connect with citizens at the speed of now. Listen as panelists Akshay Malik of Philadelphia, Kevin Hood of Tableau, and Josh Green, representing Adobe, discuss how Philadelphia and other U.S. Smart Cities have improved interactions with citizens through data visualization and a streamlined user experience.</itunes:summary>
      <itunes:subtitle>In this podcast, we sit down with municipal IT managers and industry providers who have found a way to connect with citizens at the speed of now. Listen as panelists Akshay Malik of Philadelphia, Kevin Hood of Tableau, and Josh Green, representing Adobe, discuss how Philadelphia and other U.S. Smart Cities have improved interactions with citizens through data visualization and a streamlined user experience.</itunes:subtitle>
      <itunes:keywords>innovation, cloud, transportation, government, technology, smart city, it, federal, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>132</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">960e3fdd-0add-445e-acbe-fd8c97188191</guid>
      <title>Reduce Risks with Software Supply Chain Using Software Factories with Micro Focus</title>
      <description><![CDATA[Recent breaches within government agencies have proven that they face many threat vectors that need to be addressed. Having a clean supply chain is critical to developing reliable software solutions that meet or exceed customer and market expectations for security, integrity, and reliability. Micro Focus offers a comprehensive, multi-layered approach that allows us the ability to respond quickly to customer requirements while still controlling risks associated with today’s cyber threats.
We are committed to formal supply chain security based on best practices, and we have mature processes in place to manage code development and delivery. Our practices for inbound supply chain security, development process security, and release security provide assurance that we are managing security risk with appropriate diligence and focus. 
]]></description>
      <pubDate>Mon, 16 Aug 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Micro Focus, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/reduce-risks-with-software-supply-chain-using-software-factories-with-micro-focus-XlJf93Fr</link>
      <enclosure length="13957005" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e523cfa5-461e-4d08-8fe3-800b0e387f36/audio/3780b4e1-af72-448a-80bb-deb731ec42c3/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Reduce Risks with Software Supply Chain Using Software Factories with Micro Focus</itunes:title>
      <itunes:author>Micro Focus, Carahsoft</itunes:author>
      <itunes:duration>00:14:32</itunes:duration>
      <itunes:summary>Recent breaches within government agencies have proven that they face many threat vectors that need to be addressed. Having a clean supply chain is critical to developing reliable software solutions that meet or exceed customer and market expectations for security, integrity, and reliability. Micro Focus offers a comprehensive, multi-layered approach that allows us the ability to respond quickly to customer requirements while still controlling risks associated with today’s cyber threats.
We are committed to formal supply chain security based on best practices, and we have mature processes in place to manage code development and delivery. Our practices for inbound supply chain security, development process security, and release security provide assurance that we are managing security risk with appropriate diligence and focus.</itunes:summary>
      <itunes:subtitle>Recent breaches within government agencies have proven that they face many threat vectors that need to be addressed. Having a clean supply chain is critical to developing reliable software solutions that meet or exceed customer and market expectations for security, integrity, and reliability. Micro Focus offers a comprehensive, multi-layered approach that allows us the ability to respond quickly to customer requirements while still controlling risks associated with today’s cyber threats.
We are committed to formal supply chain security based on best practices, and we have mature processes in place to manage code development and delivery. Our practices for inbound supply chain security, development process security, and release security provide assurance that we are managing security risk with appropriate diligence and focus.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>131</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1fc12ca1-dc54-4af3-950a-ace172b6ee00</guid>
      <title>Zero Trust and Protecting Data as a Strategic Asset with McAfee</title>
      <description><![CDATA[Carahsoft & McAfee Enterprise have invited two guest panelists to discuss existing Federal government frameworks for Zero Trust, the importance of placing data at the center of a Zero Trust Architecture, and best practices for meeting the requirements defined by Executive Order 14028. 
]]></description>
      <pubDate>Fri, 13 Aug 2021 19:04:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, McAfee)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/zero-trust-and-protecting-data-as-a-strategic-asset-with-mcafee-18Ri9rPC</link>
      <enclosure length="20596845" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/190ff1a8-1320-497c-9f84-950ce99972e8/audio/74c1e9e0-2ae1-4fde-8d09-13fdcd1adb5e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Zero Trust and Protecting Data as a Strategic Asset with McAfee</itunes:title>
      <itunes:author>Carahsoft, McAfee</itunes:author>
      <itunes:duration>00:21:26</itunes:duration>
      <itunes:summary>Carahsoft &amp; McAfee Enterprise have invited two guest panelists to discuss existing Federal government frameworks for Zero Trust, the importance of placing data at the center of a Zero Trust Architecture, and best practices for meeting the requirements defined by Executive Order 14028.</itunes:summary>
      <itunes:subtitle>Carahsoft &amp; McAfee Enterprise have invited two guest panelists to discuss existing Federal government frameworks for Zero Trust, the importance of placing data at the center of a Zero Trust Architecture, and best practices for meeting the requirements defined by Executive Order 14028.</itunes:subtitle>
      <itunes:keywords>biden, software, executive order, president, government, zero trust, technology, it, federal, eo, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>130</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a3013d2-9e99-4a3c-a82f-e8b49ebc808a</guid>
      <title>Accelerate Data Analytics with Artificial Intelligence</title>
      <description><![CDATA[Recent advancements in compute, networking, and storage technologies have highlighted high performance computing (HPC) along with putting data analytics and AI within reach for many agencies. Learn how Dell Technologies & Intel can run AI, data analytics, and advanced computing workloads on one system.  
]]></description>
      <pubDate>Thu, 12 Aug 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/accelerate-data-analytics-with-artificial-intelligence-5p5Do0OC</link>
      <enclosure length="44142546" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/00163ec6-2eca-46ab-b8f4-8f124b7dc6d5/audio/1b8db756-8d2a-4240-94ed-6e375949751b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Accelerate Data Analytics with Artificial Intelligence</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:45:58</itunes:duration>
      <itunes:summary>Recent advancements in compute, networking, and storage technologies have highlighted high performance computing (HPC) along with putting data analytics and AI within reach for many agencies. Learn how Dell Technologies &amp; Intel can run AI, data analytics, and advanced computing workloads on one system. </itunes:summary>
      <itunes:subtitle>Recent advancements in compute, networking, and storage technologies have highlighted high performance computing (HPC) along with putting data analytics and AI within reach for many agencies. Learn how Dell Technologies &amp; Intel can run AI, data analytics, and advanced computing workloads on one system. </itunes:subtitle>
      <itunes:keywords>carahsoft, dell, intel, data, analytics</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>129</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9551e8df-8896-4fb6-a151-d27104fc8105</guid>
      <title>Smart Cities: Data Capture &amp; Analysis</title>
      <description><![CDATA[Secure, reliable data collection is at the heart of smart cities, and their veins are made up of a network of smart devices that can augment the ability of planners to build better cities. Internet of Things (IoT) has the ability to measure and connect accurate data at scale. The power to collect and process real-time data is an invaluable resource that cities should be utilizing. Hear from government leaders on how an IoT implementation will accelerate the digital transformation in your agency. 
]]></description>
      <pubDate>Tue, 10 Aug 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/smart-cities-data-capture-analysis-8uyLfU04</link>
      <enclosure length="37240764" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/95a72215-486d-4fc2-a972-9425108e6c70/audio/ce7cad7a-d39e-4d17-a68d-5e201d78f70f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Smart Cities: Data Capture &amp; Analysis</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:38:47</itunes:duration>
      <itunes:summary>Secure, reliable data collection is at the heart of smart cities, and their veins are made up of a network of smart devices that can augment the ability of planners to build better cities. Internet of Things (IoT) has the ability to measure and connect accurate data at scale. The power to collect and process real-time data is an invaluable resource that cities should be utilizing. Hear from government leaders on how an IoT implementation will accelerate the digital transformation in your agency.</itunes:summary>
      <itunes:subtitle>Secure, reliable data collection is at the heart of smart cities, and their veins are made up of a network of smart devices that can augment the ability of planners to build better cities. Internet of Things (IoT) has the ability to measure and connect accurate data at scale. The power to collect and process real-time data is an invaluable resource that cities should be utilizing. Hear from government leaders on how an IoT implementation will accelerate the digital transformation in your agency.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">023b9897-bbf3-4f54-a1f1-4c64b6e6ba76</guid>
      <title>Securing Your Data: The New Currency of the Digital Age with Trustwave</title>
      <description><![CDATA[During this podcast, hear from experts at Trustwave Government Solutions and IMPRES as they speak about toxic combinations of misconfigurations and vulnerabilities, understanding who has access to your data, and data security best practices for securing your databases. 
]]></description>
      <pubDate>Mon, 9 Aug 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Trustwave, Carahcast)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/securing-your-data-the-new-currency-of-the-digital-age-with-trustwave-jBMS5kk2</link>
      <enclosure length="22053710" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1e924a40-ce6d-4d90-94f7-c9d964c9268d/audio/6963d71c-6cfc-4cf8-880c-b5830313e9bb/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Securing Your Data: The New Currency of the Digital Age with Trustwave</itunes:title>
      <itunes:author>Trustwave, Carahcast</itunes:author>
      <itunes:duration>00:22:58</itunes:duration>
      <itunes:summary>During this podcast, hear from experts at Trustwave Government Solutions and IMPRES as they speak about toxic combinations of misconfigurations and vulnerabilities, understanding who has access to your data, and data security best practices for securing your databases.</itunes:summary>
      <itunes:subtitle>During this podcast, hear from experts at Trustwave Government Solutions and IMPRES as they speak about toxic combinations of misconfigurations and vulnerabilities, understanding who has access to your data, and data security best practices for securing your databases.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>126</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3f2029f2-e8b1-4415-931f-ff0fe8478dcb</guid>
      <title>Protect and Defend Your Most Sensitive Data with Trustwave</title>
      <description><![CDATA[During this podcast, experts from Trustwave Government Solutions spoke about how to implement a least-privilege approach to limit who has access and to what data in your databases, why security technology that is not purpose-built for databases are not enough to protect against breach, and how attackers target database weaknesses for more than just stealing data.  
]]></description>
      <pubDate>Mon, 9 Aug 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Trustwave, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/protect-and-defend-your-most-sensitive-data-with-trustwave-iAor4WUC</link>
      <enclosure length="44460920" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/84e29945-0809-48bf-a639-db650cde5225/audio/cc815758-6e88-4777-a557-610deae820a1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Protect and Defend Your Most Sensitive Data with Trustwave</itunes:title>
      <itunes:author>Trustwave, Carahsoft</itunes:author>
      <itunes:duration>00:46:19</itunes:duration>
      <itunes:summary>During this podcast, experts from Trustwave Government Solutions spoke about how to implement a least-privilege approach to limit who has access and to what data in your databases, why security technology that is not purpose-built for databases are not enough to protect against breach, and how attackers target database weaknesses for more than just stealing data. </itunes:summary>
      <itunes:subtitle>During this podcast, experts from Trustwave Government Solutions spoke about how to implement a least-privilege approach to limit who has access and to what data in your databases, why security technology that is not purpose-built for databases are not enough to protect against breach, and how attackers target database weaknesses for more than just stealing data. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>127</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5941ffec-f749-45fd-b427-74579d35ae07</guid>
      <title>Improving National Cybersecurity: Government &amp; Industry Collaboration for Zero Trust</title>
      <description><![CDATA[President Biden’s Executive Order (EO) has accelerated the crucial need to improve U.S. cybersecurity and move towards Zero Trust. When building a true Zero Trust Architecture (ZTA), it’s critical for agencies to understand that security solutions need to work together to provide the best line of defense. Hear SailPoint, Thales, and BeyondTrust collaborate with government security leaders to discuss this topic. 
]]></description>
      <pubDate>Fri, 6 Aug 2021 17:36:28 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Thales Group, Carahsoft, BeyondTrust, SailPoint Technologies)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/improving-national-cybersecurity-government-industry-collaboration-for-zero-trust-GxvWFMgj</link>
      <enclosure length="48016486" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6ab824c6-065e-4914-90c7-f54d32de9a7e/audio/5f4af5e2-334b-44f3-babc-fa3c23ac254f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Improving National Cybersecurity: Government &amp; Industry Collaboration for Zero Trust</itunes:title>
      <itunes:author>Thales Group, Carahsoft, BeyondTrust, SailPoint Technologies</itunes:author>
      <itunes:duration>00:49:57</itunes:duration>
      <itunes:summary>President Biden’s Executive Order (EO) has accelerated the crucial need to improve U.S. cybersecurity and move towards Zero Trust. When building a true Zero Trust Architecture (ZTA), it’s critical for agencies to understand that security solutions need to work together to provide the best line of defense. Hear SailPoint, Thales, and BeyondTrust collaborate with government security leaders to discuss this topic.</itunes:summary>
      <itunes:subtitle>President Biden’s Executive Order (EO) has accelerated the crucial need to improve U.S. cybersecurity and move towards Zero Trust. When building a true Zero Trust Architecture (ZTA), it’s critical for agencies to understand that security solutions need to work together to provide the best line of defense. Hear SailPoint, Thales, and BeyondTrust collaborate with government security leaders to discuss this topic.</itunes:subtitle>
      <itunes:keywords>storage, biden, software, executive order, cloud, government, zero trust, technology, it, federal, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>125</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b641941-42f2-4bd7-833d-561b7ee31dab</guid>
      <title>Nebraska&apos;s DHHS Data Nexus: Modernizing Data Management in State Government</title>
      <description><![CDATA[Nebraska’s Department of Health and Human Services contributes to the lives and health of Nebraskans every day with the focus of helping people live better lives. During this podcast, Nebraska’s DHHS Data Manager, Brian Beswick, speaks about the challenges faced by a traditional state agency and how a modern data management strategy helped meet the challenges. 
]]></description>
      <pubDate>Thu, 5 Aug 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Snowflake, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/nebraskas-dhhs-data-nexus-modernizing-data-management-in-state-government-fG7JEp6d</link>
      <enclosure length="35477723" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/112383da-3dcc-469a-ae96-ff0329b27767/audio/3938d994-81b1-4417-bc01-09f316f06d58/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Nebraska&apos;s DHHS Data Nexus: Modernizing Data Management in State Government</itunes:title>
      <itunes:author>Snowflake, Carahsoft</itunes:author>
      <itunes:duration>00:36:57</itunes:duration>
      <itunes:summary>Nebraska’s Department of Health and Human Services contributes to the lives and health of Nebraskans every day with the focus of helping people live better lives. During this podcast, Nebraska’s DHHS Data Manager, Brian Beswick, speaks about the challenges faced by a traditional state agency and how a modern data management strategy helped meet the challenges.</itunes:summary>
      <itunes:subtitle>Nebraska’s Department of Health and Human Services contributes to the lives and health of Nebraskans every day with the focus of helping people live better lives. During this podcast, Nebraska’s DHHS Data Manager, Brian Beswick, speaks about the challenges faced by a traditional state agency and how a modern data management strategy helped meet the challenges.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>124</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4cfd923f-6421-465f-8d36-fe097ecae150</guid>
      <title>Data Analytics Deep Dive with Kapstone Technologies</title>
      <description><![CDATA[In this week’s episode, Mihika Pethe, Channel Partner Manager, Pravin Patil, Managing Partner, and Robert Antony, Senior Solutions Architect, from Kapstone Technologies will take a deep dive into the data analytics at Kapstone Technologies, including: new projects, strengths, major wins, and architecting solutions. 
]]></description>
      <pubDate>Wed, 4 Aug 2021 20:15:25 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, Kapstone Technologies, Amazon Web Services, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-analytics-deep-dive-with-kapstone-technologies-I19a7frb</link>
      <enclosure length="12465661" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/131fba52-fe6d-4bc5-8f4f-0be293c64f2a/audio/1cafdcfe-0ae6-4d70-8af7-4b25e1ddd0b5/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Data Analytics Deep Dive with Kapstone Technologies</itunes:title>
      <itunes:author>AWS, Kapstone Technologies, Amazon Web Services, Carahsoft</itunes:author>
      <itunes:duration>00:12:58</itunes:duration>
      <itunes:summary>In this week’s episode, Mihika Pethe, Channel Partner Manager, Pravin Patil, Managing Partner, and Robert Antony, Senior Solutions Architect, from Kapstone Technologies will take a deep dive into the data analytics at Kapstone Technologies, including: new projects, strengths, major wins, and architecting solutions.</itunes:summary>
      <itunes:subtitle>In this week’s episode, Mihika Pethe, Channel Partner Manager, Pravin Patil, Managing Partner, and Robert Antony, Senior Solutions Architect, from Kapstone Technologies will take a deep dive into the data analytics at Kapstone Technologies, including: new projects, strengths, major wins, and architecting solutions.</itunes:subtitle>
      <itunes:keywords>software, cloud, devops, government, technology, intel, it, federal, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>123</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2f72f5cb-de94-42cd-8ea3-0d2becb99c3f</guid>
      <title>Defining and Leveraging DevOps with M&amp;S Consulting</title>
      <description><![CDATA[Listen to this week's episode with Hazem Hower and Dominic Pucci from M&S Consulting where they will discuss and define DevOps and explain how M&S Consulting leverages this practice when delivering applications and services at a high rate.  
]]></description>
      <pubDate>Wed, 28 Jul 2021 16:04:10 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Amazon Web Services, AWS, Carahsoft, M&amp;S Consulting)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/defining-and-leveraging-devops-with-ms-consulting-Sw_Kyddz</link>
      <enclosure length="14653961" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/19494613-e75f-4da2-a86c-b1ad7ed460f2/audio/7d0db96c-63a6-4ce4-89d5-f171a470dbec/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Defining and Leveraging DevOps with M&amp;S Consulting</itunes:title>
      <itunes:author>Amazon Web Services, AWS, Carahsoft, M&amp;S Consulting</itunes:author>
      <itunes:duration>00:15:14</itunes:duration>
      <itunes:summary>Listen to this week&apos;s episode with Hazem Hower and Dominic Pucci from M&amp;S Consulting where they will discuss and define DevOps and explain how M&amp;S Consulting leverages this practice when delivering applications and services at a high rate. </itunes:summary>
      <itunes:subtitle>Listen to this week&apos;s episode with Hazem Hower and Dominic Pucci from M&amp;S Consulting where they will discuss and define DevOps and explain how M&amp;S Consulting leverages this practice when delivering applications and services at a high rate. </itunes:subtitle>
      <itunes:keywords>software, cloud, devops, government, technology, it, federal, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>122</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">061ceee6-afc1-4086-9b5f-32e71646102f</guid>
      <title>Zero Trust and the Pentagon’s Identity-Centric Security Roadmap with BeyondTrust and SailPoint Technologies</title>
      <description><![CDATA[In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk. Brandon Iske, Chief Engineer for the Security Enablers Portfolio at DISA, Josh Brodbent, Director of Public Sector Solutions Engineering at BeyondTrust, and Frank Briguglio, Global Public Sector Strategist at SailPoint, along with moderator Matt Topper, President and Solutions Catalyst at UberEther will discuss how to build an effective zero trust approach with an emphasis on identity and privilege access management. 
]]></description>
      <pubDate>Wed, 21 Jul 2021 15:21:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, SailPoint Technologies, UberEther, BeyondTrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/zero-trust-and-the-pentagons-identity-centric-security-roadmap-with-beyondtrust-and-sailpoint-technologies-siY_mMtF</link>
      <enclosure length="47727202" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/885b40c9-5a9a-47d3-88fb-e757160a899f/audio/66162b98-c086-4b31-a67a-29bc21d0cd2b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Zero Trust and the Pentagon’s Identity-Centric Security Roadmap with BeyondTrust and SailPoint Technologies</itunes:title>
      <itunes:author>Carahsoft, SailPoint Technologies, UberEther, BeyondTrust</itunes:author>
      <itunes:duration>00:49:41</itunes:duration>
      <itunes:summary>In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk. Brandon Iske, Chief Engineer for the Security Enablers Portfolio at DISA, Josh Brodbent, Director of Public Sector Solutions Engineering at BeyondTrust, and Frank Briguglio, Global Public Sector Strategist at SailPoint, along with moderator Matt Topper, President and Solutions Catalyst at UberEther will discuss how to build an effective zero trust approach with an emphasis on identity and privilege access management.</itunes:summary>
      <itunes:subtitle>In this new environment, a zero trust approach can help agencies minimize their attack surface and cyber risk. Brandon Iske, Chief Engineer for the Security Enablers Portfolio at DISA, Josh Brodbent, Director of Public Sector Solutions Engineering at BeyondTrust, and Frank Briguglio, Global Public Sector Strategist at SailPoint, along with moderator Matt Topper, President and Solutions Catalyst at UberEther will discuss how to build an effective zero trust approach with an emphasis on identity and privilege access management.</itunes:subtitle>
      <itunes:keywords>software, cloud, government, zero trust, technology, it, federal, dod, department of defense, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>121</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">05bbd6ba-4098-4611-ae0c-ae003af51ed5</guid>
      <title>Archiving, Purging &amp; Strategic Back-up of Data with RV Global Solutions</title>
      <description><![CDATA[In this week’s podcast episode, Rahul Gangu and Venkat Chivukula from RV Global Solutions will discuss how to leverage the AWS cloud for the highest ROI when archiving, purging and backing-up data. 
]]></description>
      <pubDate>Tue, 20 Jul 2021 19:43:28 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Amazon Web Services, AWS, Carahsoft, RV Global Solutions)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/archiving-purging-strategic-back-up-of-data-with-rv-global-solutions-KwJO34KL</link>
      <enclosure length="8851655" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d967bef9-247f-46d0-9d7e-325303263dbc/audio/3f946524-af01-4c1d-b647-7b2b0f503302/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Archiving, Purging &amp; Strategic Back-up of Data with RV Global Solutions</itunes:title>
      <itunes:author>Amazon Web Services, AWS, Carahsoft, RV Global Solutions</itunes:author>
      <itunes:duration>00:09:12</itunes:duration>
      <itunes:summary>In this week’s podcast episode, Rahul Gangu and Venkat Chivukula from RV Global Solutions will discuss how to leverage the AWS cloud for the highest ROI when archiving, purging and backing-up data.</itunes:summary>
      <itunes:subtitle>In this week’s podcast episode, Rahul Gangu and Venkat Chivukula from RV Global Solutions will discuss how to leverage the AWS cloud for the highest ROI when archiving, purging and backing-up data.</itunes:subtitle>
      <itunes:keywords>software, cloud, government, roi, technology, data, it, federal, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>120</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f665a503-e3bb-4c29-bd59-47b228840e9b</guid>
      <title>Reduce the Cost and Complexity of Your Current Data Security Program While Expanding Coverage and Visibility with Imperva</title>
      <description><![CDATA[Do you have a Data Security program or process, even one as basic as collecting logs? If you do, you will agree that getting results is complex, requires too much manual effort, is costly in more than one way, and likely doesn’t deliver on the actual results you need today or needed yesterday. Listen to this podcast to learn the following: -How you can more easily secure data with no need to replace or throw out the solution you already have -Secure more than a small portion of your data stores without added complexity or server agents if you’re using them -Expand security’s visibility to any or every location where critical data exists while reducing effort and deployed technology (On-prem, Cloud, Hybrid) 
]]></description>
      <pubDate>Tue, 20 Jul 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Imperva)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/reduce-the-cost-and-complexity-of-your-current-data-security-program-while-expanding-coverage-and-visibility-with-imperva-OFzbalaw</link>
      <enclosure length="34974918" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b7e98ae1-2926-4935-a7be-71836e40d2d4/audio/d72e7de6-e364-4b48-af11-55621a1d9d65/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Reduce the Cost and Complexity of Your Current Data Security Program While Expanding Coverage and Visibility with Imperva</itunes:title>
      <itunes:author>Carahsoft, Imperva</itunes:author>
      <itunes:duration>00:36:26</itunes:duration>
      <itunes:summary>Do you have a Data Security program or process, even one as basic as collecting logs? If you do, you will agree that getting results is complex, requires too much manual effort, is costly in more than one way, and likely doesn’t deliver on the actual results you need today or needed yesterday. Listen to this podcast to learn the following: -How you can more easily secure data with no need to replace or throw out the solution you already have -Secure more than a small portion of your data stores without added complexity or server agents if you’re using them -Expand security’s visibility to any or every location where critical data exists while reducing effort and deployed technology (On-prem, Cloud, Hybrid)</itunes:summary>
      <itunes:subtitle>Do you have a Data Security program or process, even one as basic as collecting logs? If you do, you will agree that getting results is complex, requires too much manual effort, is costly in more than one way, and likely doesn’t deliver on the actual results you need today or needed yesterday. Listen to this podcast to learn the following: -How you can more easily secure data with no need to replace or throw out the solution you already have -Secure more than a small portion of your data stores without added complexity or server agents if you’re using them -Expand security’s visibility to any or every location where critical data exists while reducing effort and deployed technology (On-prem, Cloud, Hybrid)</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>119</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6c4e81aa-86c7-441a-8603-e13a2a4420c6</guid>
      <title>WHEO Foundational Concept: Threat Intelligence Sharing to Drive Predictive Security</title>
      <description><![CDATA[Please join industry experts as they discuss White House Executive Order 14028, Improving the Nation’s Cybersecurity focusing on improving Threat Intelligence sharing and predictive security.  
]]></description>
      <pubDate>Fri, 16 Jul 2021 14:22:33 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, McAfee)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/wheo-foundational-concept-threat-intelligence-sharing-to-drive-predictive-security-Lt0dlCkj</link>
      <enclosure length="29219742" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8cbc5573-8aab-4905-bd42-f3e2c5500442/audio/65df7e76-78ee-4105-af2e-f65c2c172917/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>WHEO Foundational Concept: Threat Intelligence Sharing to Drive Predictive Security</itunes:title>
      <itunes:author>Carahsoft, McAfee</itunes:author>
      <itunes:duration>00:30:26</itunes:duration>
      <itunes:summary>Please join industry experts as they discuss White House Executive Order 14028, Improving the Nation’s Cybersecurity focusing on improving Threat Intelligence sharing and predictive security. </itunes:summary>
      <itunes:subtitle>Please join industry experts as they discuss White House Executive Order 14028, Improving the Nation’s Cybersecurity focusing on improving Threat Intelligence sharing and predictive security. </itunes:subtitle>
      <itunes:keywords>software, executive order, government, technology, intel, it, federal, white house, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>118</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">362cbaa6-b33a-4036-9f05-c9b90fe83d01</guid>
      <title>High Performance Cloud Storage with Buurst SoftNAS</title>
      <description><![CDATA[In this week’s podcast episode, Eric Olson, Vice President of Cloud Solutions Architects, Buurst, will discuss how SoftNAS, one of Buurst’s cloud storage solutions, can help improve performance, availability, and cost control for their customers. 
]]></description>
      <pubDate>Thu, 15 Jul 2021 13:36:04 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, Amazon Web Services, Buurst Inc, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/high-performance-cloud-storage-with-buurst-softnas-pFkxjRbs</link>
      <enclosure length="11240746" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/065d7250-8d95-4ac1-9817-b910087df06a/audio/7a76a0db-0ba1-470f-9433-1448660d788e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>High Performance Cloud Storage with Buurst SoftNAS</itunes:title>
      <itunes:author>AWS, Amazon Web Services, Buurst Inc, Carahsoft</itunes:author>
      <itunes:duration>00:11:41</itunes:duration>
      <itunes:summary>In this week’s podcast episode, Eric Olson, Vice President of Cloud Solutions Architects, Buurst, will discuss how SoftNAS, one of Buurst’s cloud storage solutions, can help improve performance, availability, and cost control for their customers.</itunes:summary>
      <itunes:subtitle>In this week’s podcast episode, Eric Olson, Vice President of Cloud Solutions Architects, Buurst, will discuss how SoftNAS, one of Buurst’s cloud storage solutions, can help improve performance, availability, and cost control for their customers.</itunes:subtitle>
      <itunes:keywords>storage, software, cloud, government, technology, it, federal, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>117</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c527011-5245-4152-85c5-ae8bdaa9e1b0</guid>
      <title>Pros of Custom App Development vs. Off-The-Shelf with Mindgrub</title>
      <description><![CDATA[In this week’s episode, Ben Slavin, Senior Vice President of Strategy and Design, and Vincent Sharps, Chief Business Officer and Executive Vice President at Mindgrub, will discuss the pros and cons of custom application development vs. off-the-shelf software solutions. 
]]></description>
      <pubDate>Tue, 6 Jul 2021 19:53:22 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Amazon Web Services, Carahsoft, Mindgrub, AWS)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/pros-of-custom-app-development-vs-off-the-shelf-with-mindgrub-fvehcy5U</link>
      <enclosure length="14760443" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fbeaa7d8-a0c5-4a56-b48a-770b095b2292/audio/26cdce28-154f-4cc8-9a23-a3d3bf380266/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Pros of Custom App Development vs. Off-The-Shelf with Mindgrub</itunes:title>
      <itunes:author>Amazon Web Services, Carahsoft, Mindgrub, AWS</itunes:author>
      <itunes:duration>00:15:21</itunes:duration>
      <itunes:summary>In this week’s episode, Ben Slavin, Senior Vice President of Strategy and Design, and Vincent Sharps, Chief Business Officer and Executive Vice President at Mindgrub, will discuss the pros and cons of custom application development vs. off-the-shelf software solutions.</itunes:summary>
      <itunes:subtitle>In this week’s episode, Ben Slavin, Senior Vice President of Strategy and Design, and Vincent Sharps, Chief Business Officer and Executive Vice President at Mindgrub, will discuss the pros and cons of custom application development vs. off-the-shelf software solutions.</itunes:subtitle>
      <itunes:keywords>storage, software, cloud, government, technology, it, federal, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>116</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8e792b18-6de3-4390-84ad-ed92b43c553b</guid>
      <title>The American Rescue Plan: Improve Cyber Defenses and Move Towards Zero Trust</title>
      <description><![CDATA[Listen to Rob Efrus, Founder and CEO of Efrus Federal Advisors and Morey Haber, CTO and CISO at BeyondTrust discuss Biden’s Executive Order on Cybersecurity and what that means for “Zero Trust.” They will break down the ARP and Biden’s 2022 Fiscal Budget to explain how your agency can use funds now, and analyze how and why Privilege Management plays an increasingly crucial role in mitigating cyber-attacks and protecting CI.  
]]></description>
      <pubDate>Tue, 6 Jul 2021 16:33:11 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, BeyondTrust)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-american-rescue-plan-improve-cyber-defenses-and-move-towards-zero-trust-1pfpeTTt</link>
      <enclosure length="46507979" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ffbc99b4-7f43-4ff6-baf7-4a6607364ea4/audio/2c0af455-d396-4e0e-b336-939173e70888/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The American Rescue Plan: Improve Cyber Defenses and Move Towards Zero Trust</itunes:title>
      <itunes:author>Carahsoft, BeyondTrust</itunes:author>
      <itunes:duration>00:48:24</itunes:duration>
      <itunes:summary>Listen to Rob Efrus, Founder and CEO of Efrus Federal Advisors and Morey Haber, CTO and CISO at BeyondTrust discuss Biden’s Executive Order on Cybersecurity and what that means for “Zero Trust.” They will break down the ARP and Biden’s 2022 Fiscal Budget to explain how your agency can use funds now, and analyze how and why Privilege Management plays an increasingly crucial role in mitigating cyber-attacks and protecting CI. </itunes:summary>
      <itunes:subtitle>Listen to Rob Efrus, Founder and CEO of Efrus Federal Advisors and Morey Haber, CTO and CISO at BeyondTrust discuss Biden’s Executive Order on Cybersecurity and what that means for “Zero Trust.” They will break down the ARP and Biden’s 2022 Fiscal Budget to explain how your agency can use funds now, and analyze how and why Privilege Management plays an increasingly crucial role in mitigating cyber-attacks and protecting CI. </itunes:subtitle>
      <itunes:keywords>biden, software, government, zero trust, technology, it, cybersecurity, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>115</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">faf7c6bb-160f-4e2c-ac42-9fa81aa4476b</guid>
      <title>How to Detect Innovation Theater and Fine Tune Your Outcome Delivery with VMware Tanzu Labs</title>
      <description><![CDATA[Innovation theater is rampant in government. Organizations tout their agile credibility and tech chops, but true mission outcomes are hard to come by. By engaging, experimenting, and iterating in production with real users, risk and cost is significantly reduced and outcomes become possible in fractions of the time. 
]]></description>
      <pubDate>Thu, 1 Jul 2021 14:54:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware, IMPRES Technology Solutions)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-to-detect-innovation-theater-and-fine-tune-your-outcome-delivery-with-vmware-tanzu-labs-mJ2j8ZpP</link>
      <enclosure length="38506529" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/62b92998-5ea1-4f68-acfc-60fd6e2c27b1/audio/e00cd269-76d2-4ac6-8c4e-d6f64aa54754/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How to Detect Innovation Theater and Fine Tune Your Outcome Delivery with VMware Tanzu Labs</itunes:title>
      <itunes:author>Carahsoft, VMware, IMPRES Technology Solutions</itunes:author>
      <itunes:duration>00:40:05</itunes:duration>
      <itunes:summary>Innovation theater is rampant in government. Organizations tout their agile credibility and tech chops, but true mission outcomes are hard to come by. By engaging, experimenting, and iterating in production with real users, risk and cost is significantly reduced and outcomes become possible in fractions of the time.</itunes:summary>
      <itunes:subtitle>Innovation theater is rampant in government. Organizations tout their agile credibility and tech chops, but true mission outcomes are hard to come by. By engaging, experimenting, and iterating in production with real users, risk and cost is significantly reduced and outcomes become possible in fractions of the time.</itunes:subtitle>
      <itunes:keywords>software, cloud, government, it, federal, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>114</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">58c80cd9-3623-45e5-a2c5-7830c4e0e6c6</guid>
      <title>CFO Control Tower with cBEYONData</title>
      <description><![CDATA[Listen to this podcast session with David Schmidtknecht, Co-Founder, Keith Johnson, Co-Founder and Theresa Backus Dunn, Director of Marketing, at cBEYONData, to learn about utilizing CFO Control Tower and AWS to modernize your organization’s financial processes. 
]]></description>
      <pubDate>Wed, 30 Jun 2021 14:30:13 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, AWS, Amazon Web Services, cBEYONData)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cfo-control-tower-with-cbeyondata-AFs2jIyv</link>
      <enclosure length="9209709" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d9125fd4-5119-4bd0-bcfc-829b372ef195/audio/f18ef781-40a7-415c-85fc-997df67dcb8c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>CFO Control Tower with cBEYONData</itunes:title>
      <itunes:author>Carahsoft, AWS, Amazon Web Services, cBEYONData</itunes:author>
      <itunes:duration>00:09:34</itunes:duration>
      <itunes:summary>Listen to this podcast session with David Schmidtknecht, Co-Founder, Keith Johnson, Co-Founder and Theresa Backus Dunn, Director of Marketing, at cBEYONData, to learn about utilizing CFO Control Tower and AWS to modernize your organization’s financial processes.</itunes:summary>
      <itunes:subtitle>Listen to this podcast session with David Schmidtknecht, Co-Founder, Keith Johnson, Co-Founder and Theresa Backus Dunn, Director of Marketing, at cBEYONData, to learn about utilizing CFO Control Tower and AWS to modernize your organization’s financial processes.</itunes:subtitle>
      <itunes:keywords>software, cloud, government, technology, it, federal, security, finance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">99314ae6-1f1e-4e0a-8379-ef37953db255</guid>
      <title>Protecting Your Customers&apos; Apps and Data with VMware Intrinsic Security Solutions</title>
      <description><![CDATA[During this podcast, VMware partners heard from VMware's Damon Cabanillas, VP of Sales. 
]]></description>
      <pubDate>Mon, 28 Jun 2021 20:52:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/protecting-your-customers-apps-and-data-with-vmware-intrinsic-security-solutions-TPtRngUN</link>
      <enclosure length="17232358" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/db8fe957-bc51-418e-81aa-73e333d6f869/audio/a736ebaa-7e17-4cac-aad6-653261edb1f4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Protecting Your Customers&apos; Apps and Data with VMware Intrinsic Security Solutions</itunes:title>
      <itunes:author>VMware, Carahsoft</itunes:author>
      <itunes:duration>00:17:56</itunes:duration>
      <itunes:summary>During this podcast, VMware partners heard from VMware&apos;s Damon Cabanillas, VP of Sales.</itunes:summary>
      <itunes:subtitle>During this podcast, VMware partners heard from VMware&apos;s Damon Cabanillas, VP of Sales.</itunes:subtitle>
      <itunes:keywords>software, cloud, technology, it, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>112</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db8dc4ed-c043-4fc3-9165-c0fc1794bee4</guid>
      <title>Creating New Digital Possibilities for Your Customers with VMware Multi-Cloud Solutions</title>
      <description><![CDATA[During this podcast, VMware partners heard from Mike Wilkerson, VMware Cloud Specialist, who provided an overview of VMware Cloud on AWS. 
]]></description>
      <pubDate>Mon, 28 Jun 2021 20:50:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/creating-new-digital-possibilities-for-your-customers-with-vmware-multi-cloud-solutions-_O5ig1R_</link>
      <enclosure length="32714974" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e2a7e595-13b2-47cc-824c-db1724367795/audio/d41b866a-1e96-4045-9c9b-cfa770d7c733/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Creating New Digital Possibilities for Your Customers with VMware Multi-Cloud Solutions</itunes:title>
      <itunes:author>VMware, Carahsoft</itunes:author>
      <itunes:duration>00:34:03</itunes:duration>
      <itunes:summary>During this podcast, VMware partners heard from Mike Wilkerson, VMware Cloud Specialist, who provided an overview of VMware Cloud on AWS.</itunes:summary>
      <itunes:subtitle>During this podcast, VMware partners heard from Mike Wilkerson, VMware Cloud Specialist, who provided an overview of VMware Cloud on AWS.</itunes:subtitle>
      <itunes:keywords>software, cloud, government, technology, it, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>111</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">57559dda-ba8e-4aa5-b76b-a7307ac77f45</guid>
      <title>Future-Proofing Your Customers&apos; Business with Modern Application Technologies from VMware</title>
      <description><![CDATA[During this podcast, VMware partners heard from Andrew Berenato, Global Tanzu Alliances and Paul Maunder, U.S. Regional Director, SLED - Tanzu, VMware, who provided an overview of the VMware Tanzu portfolio. 
]]></description>
      <pubDate>Mon, 28 Jun 2021 20:41:32 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Tanzu, Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/future-proofing-your-customers-business-with-modern-application-technologies-from-vmware-rknw2W1r</link>
      <enclosure length="25868501" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9e21a796-9775-4abb-9769-c9c438ab7c6b/audio/03d0a49b-a6d2-412e-8b33-66fc4ec7d893/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Future-Proofing Your Customers&apos; Business with Modern Application Technologies from VMware</itunes:title>
      <itunes:author>Tanzu, Carahsoft, VMware</itunes:author>
      <itunes:duration>00:26:55</itunes:duration>
      <itunes:summary>During this podcast, VMware partners heard from Andrew Berenato, Global Tanzu Alliances and Paul Maunder, U.S. Regional Director, SLED - Tanzu, VMware, who provided an overview of the VMware Tanzu portfolio.</itunes:summary>
      <itunes:subtitle>During this podcast, VMware partners heard from Andrew Berenato, Global Tanzu Alliances and Paul Maunder, U.S. Regional Director, SLED - Tanzu, VMware, who provided an overview of the VMware Tanzu portfolio.</itunes:subtitle>
      <itunes:keywords>cloud, government, modernization, technology, it, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>110</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f530f8c2-aee7-45da-a435-0ad6a2acbe9d</guid>
      <title>Networking and Security Architecture of the Digital Age with VMware&apos;s Virtual Cloud Network</title>
      <description><![CDATA[During this podcast, VMware partners heard from George Cassels, Network Security Specialist, at VMware.

 
]]></description>
      <pubDate>Mon, 28 Jun 2021 20:35:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/networking-and-security-architecture-of-the-digital-age-with-vmwares-virtual-cloud-network-m08oId4j</link>
      <enclosure length="16148499" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c742834a-9f58-4f43-9e5b-691a4bc12ce4/audio/ade62c07-64a8-4db3-be69-7e298decf33f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Networking and Security Architecture of the Digital Age with VMware&apos;s Virtual Cloud Network</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:16:49</itunes:duration>
      <itunes:summary>During this podcast, VMware partners heard from George Cassels, Network Security Specialist, at VMware.

</itunes:summary>
      <itunes:subtitle>During this podcast, VMware partners heard from George Cassels, Network Security Specialist, at VMware.

</itunes:subtitle>
      <itunes:keywords>software, government, technology, it, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>109</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e76691cf-0b5a-45c5-aba2-fbdb9d7a5fb4</guid>
      <title>Delivering an Intuitive Digital Workspace to Customers with VMware</title>
      <description><![CDATA[During this podcast, VMware partners heard from Carahsoft's Nick Wager, Vmware Pre-Sales System Engineer. 
]]></description>
      <pubDate>Mon, 28 Jun 2021 20:23:02 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/delivering-an-intuitive-digital-workspace-to-customers-with-vmware-ZBzfYKcz</link>
      <enclosure length="22570759" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5a233179-98b4-45dc-94c8-be3cc797faac/audio/85b94da2-35cd-482d-af7e-eaaf4dd6628d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Delivering an Intuitive Digital Workspace to Customers with VMware</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:23:29</itunes:duration>
      <itunes:summary>During this podcast, VMware partners heard from Carahsoft&apos;s Nick Wager, Vmware Pre-Sales System Engineer.</itunes:summary>
      <itunes:subtitle>During this podcast, VMware partners heard from Carahsoft&apos;s Nick Wager, Vmware Pre-Sales System Engineer.</itunes:subtitle>
      <itunes:keywords>software, technology, it, digital workspace</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>108</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">546ecb90-81d8-43f7-9763-44523b3e27aa</guid>
      <title>Unmatched Security Through the Power of Voice with Nuance</title>
      <description><![CDATA[In this podcast, Senior Lead of Nuance, Carahsoft, Elizabeth Savage, discusses security and biometric solutions from Nuance, with features such as integrated authentication, multi-modal authentication, fraud detection plus prevention, deep neural networks (DNN) and advanced algorithms to detect synthetic speech, recordings, and brute force attacks. 
]]></description>
      <pubDate>Wed, 23 Jun 2021 15:55:06 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Nuance)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unmatched-security-through-the-power-of-voice-with-nuance-fKkxV4U7</link>
      <enclosure length="19609354" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/edca8fb0-c345-4183-8926-cbbe7effbf93/audio/46dd88b0-d4ed-499a-b217-86dd0f652e14/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unmatched Security Through the Power of Voice with Nuance</itunes:title>
      <itunes:author>Carahsoft, Nuance</itunes:author>
      <itunes:duration>00:20:25</itunes:duration>
      <itunes:summary>In this podcast, Senior Lead of Nuance, Carahsoft, Elizabeth Savage, discusses security and biometric solutions from Nuance, with features such as integrated authentication, multi-modal authentication, fraud detection plus prevention, deep neural networks (DNN) and advanced algorithms to detect synthetic speech, recordings, and brute force attacks.</itunes:summary>
      <itunes:subtitle>In this podcast, Senior Lead of Nuance, Carahsoft, Elizabeth Savage, discusses security and biometric solutions from Nuance, with features such as integrated authentication, multi-modal authentication, fraud detection plus prevention, deep neural networks (DNN) and advanced algorithms to detect synthetic speech, recordings, and brute force attacks.</itunes:subtitle>
      <itunes:keywords>private sector, government, fraud, it, public sector, hackers</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>107</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">16322969-94b2-4da7-9585-26349ba0048f</guid>
      <title>Enable the Mission with Digital Experiences</title>
      <description><![CDATA[<p>Featured Webinar Speakers</p><p><strong>Moderator:</strong> John Landwehr, VP & Public Sector CTO, Adobe</p><p>- Dr. Simon Pincus, Chief, Connected Health Branch, <i>Defense Health Agency</i>; </p><p>- Steve Wallace, Systems Innovation Scientist, Emerging Technologies Directorate, <i>Defense Information Systems Agency (DISA)</i></p><p>- Amy Taira, JELA Program Manager, Carahsoft; <br /><br /> </p>
]]></description>
      <pubDate>Tue, 22 Jun 2021 23:02:48 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Adobe, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/enable-the-mission-with-digital-experiences-IjHpAzI8</link>
      <content:encoded><![CDATA[<p>Featured Webinar Speakers</p><p><strong>Moderator:</strong> John Landwehr, VP & Public Sector CTO, Adobe</p><p>- Dr. Simon Pincus, Chief, Connected Health Branch, <i>Defense Health Agency</i>; </p><p>- Steve Wallace, Systems Innovation Scientist, Emerging Technologies Directorate, <i>Defense Information Systems Agency (DISA)</i></p><p>- Amy Taira, JELA Program Manager, Carahsoft; <br /><br /> </p>
]]></content:encoded>
      <enclosure length="45580209" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b12101b2-426b-4bd7-8ec2-43db49a42b38/audio/4b06ecb0-dc8d-420b-bd70-a7a4fe53875c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Enable the Mission with Digital Experiences</itunes:title>
      <itunes:author>Adobe, Carahsoft</itunes:author>
      <itunes:duration>00:47:29</itunes:duration>
      <itunes:summary>This past year has accelerated the demand for digital experiences and virtual outreach at the Department of Defense. From recruits seeking information to service members completing training, to staff collaborating remotely, omnichannel, personalized, and secure online experiences are now essential to enabling mission readiness. Explore these digital operations, secure communications, and process improvements critical to force readiness. 

Listen today to learn how to leverage the Joint Enterprise License Agreement (JELA) to enable your workforce to achieve mission objectives.</itunes:summary>
      <itunes:subtitle>This past year has accelerated the demand for digital experiences and virtual outreach at the Department of Defense. From recruits seeking information to service members completing training, to staff collaborating remotely, omnichannel, personalized, and secure online experiences are now essential to enabling mission readiness. Explore these digital operations, secure communications, and process improvements critical to force readiness. 

Listen today to learn how to leverage the Joint Enterprise License Agreement (JELA) to enable your workforce to achieve mission objectives.</itunes:subtitle>
      <itunes:keywords>jela, joint enterprise license agreement, process improvements, digital operations, omnichannel, secure communications, adobe, dod</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>106</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1531b9df-3b8a-4c72-9f52-cc20aeb1bcd5</guid>
      <title>Connect and FedRAMP with VoiceFoundry TTEC</title>
      <description><![CDATA[In this podcast, Stephen Parowski, Group Vice President at TTEC - Digital, discusses Connect and FedRAMP.

 
]]></description>
      <pubDate>Tue, 22 Jun 2021 19:27:30 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (TTEC, Amazon Web Services, Carahsoft, AWS, VoiceFoundry)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/connect-and-fedramp-with-voicefoundry-ttec-M3szwp9S</link>
      <enclosure length="9857813" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/cb816553-5923-4c3c-90d1-ff3dd74bf216/audio/dd3e74e2-ec54-4b93-ad0b-83524d535335/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Connect and FedRAMP with VoiceFoundry TTEC</itunes:title>
      <itunes:author>TTEC, Amazon Web Services, Carahsoft, AWS, VoiceFoundry</itunes:author>
      <itunes:duration>00:10:15</itunes:duration>
      <itunes:summary>In this podcast, Stephen Parowski, Group Vice President at TTEC - Digital, discusses Connect and FedRAMP.

</itunes:summary>
      <itunes:subtitle>In this podcast, Stephen Parowski, Group Vice President at TTEC - Digital, discusses Connect and FedRAMP.

</itunes:subtitle>
      <itunes:keywords>government, technology, it, fedramp</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">66ac7462-f105-4e7a-9c56-c0afaf5f6bf1</guid>
      <title>Design and Operate Optimized AWS Environments with Kinect Consulting</title>
      <description><![CDATA[Listen to this podcast where Kevin Mead, Vice President of Business Development at Kinect Consulting, discusses the importance of the AWS Well-Architected Framework for federal agencies. 
]]></description>
      <pubDate>Thu, 17 Jun 2021 21:05:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, Amazon Web Services, Kinect Consulting, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/design-and-operate-optimized-aws-environments-with-kinect-consulting-i2nRUvb9</link>
      <enclosure length="9576505" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/54605c9d-2911-49c4-90f0-0c76c294b09a/audio/ebf59136-2f5b-41c3-8aa8-cb539d8ebca7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Design and Operate Optimized AWS Environments with Kinect Consulting</itunes:title>
      <itunes:author>AWS, Amazon Web Services, Kinect Consulting, Carahsoft</itunes:author>
      <itunes:duration>00:09:57</itunes:duration>
      <itunes:summary>Listen to this podcast where Kevin Mead, Vice President of Business Development at Kinect Consulting, discusses the importance of the AWS Well-Architected Framework for federal agencies.</itunes:summary>
      <itunes:subtitle>Listen to this podcast where Kevin Mead, Vice President of Business Development at Kinect Consulting, discusses the importance of the AWS Well-Architected Framework for federal agencies.</itunes:subtitle>
      <itunes:keywords>software, government, technology, it, federal</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>104</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a5b5caf1-7395-47cc-9f1f-3f524875e872</guid>
      <title>The White House Executive Order and More</title>
      <description><![CDATA[Please join industry experts to discuss the implications of the order, how agency department heads are reacting today, and share their insights into what to be on the lookout for from a policy, management, and cyber defender operator perspective. 
]]></description>
      <pubDate>Tue, 15 Jun 2021 20:48:19 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, McAfee)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-white-house-executive-order-and-more-4JZSkDp6</link>
      <enclosure length="36719043" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/94911fdc-e891-489e-adc6-9bc920c0a85a/audio/41978ca4-24a2-442e-addc-d9c29b274649/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The White House Executive Order and More</itunes:title>
      <itunes:author>Carahsoft, McAfee</itunes:author>
      <itunes:duration>00:38:13</itunes:duration>
      <itunes:summary>Please join industry experts to discuss the implications of the order, how agency department heads are reacting today, and share their insights into what to be on the lookout for from a policy, management, and cyber defender operator perspective.</itunes:summary>
      <itunes:subtitle>Please join industry experts to discuss the implications of the order, how agency department heads are reacting today, and share their insights into what to be on the lookout for from a policy, management, and cyber defender operator perspective.</itunes:subtitle>
      <itunes:keywords>government, technology, it, public sector, white house</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>103</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1ba195b7-6e38-4e5d-a1f9-71767b633379</guid>
      <title>Digital Transformation with Atlassian</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Mon, 14 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/digital-transformation-with-atlassian-0WO2m2Dt</link>
      <enclosure length="26224107" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f18512a5-058b-4d3e-853c-308c25a42db6/audio/f3d02cb1-f83d-4c93-9b71-0d5776ec6594/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Digital Transformation with Atlassian</itunes:title>
      <itunes:author>Atlassian, Carahsoft</itunes:author>
      <itunes:duration>00:27:19</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>102</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db04b8d1-bf1c-490d-a021-d3a3d2f03516</guid>
      <title>Accessibility and Forms: The Missing Piece of ADA Compliance with Adobe</title>
      <description><![CDATA[In this podcast, hear insights from industry experts about key accessibility requirements as described in the Web Content Accessibility Guidelines (WCAG) 2.1. Specifically, this session will provide: Tips to help your agency determine how compliant you are today and formulate a plan to make all online forms accessible and compliant, Insights on utilizing Adobe Experience Manager (AEM) Forms for enterprise PDF creation to ensure compliance. Don't miss this opportunity to learn how to eliminate your agency's risk and provide citizens and employees with a seamless, 100% digital forms experience. 
]]></description>
      <pubDate>Mon, 7 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Adobe, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/accessibility-and-forms-the-missing-piece-of-ada-compliance-with-adobe-PimyVMIT</link>
      <enclosure length="27611731" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8c7ca833-1961-4d18-a26a-daed7c0af21b/audio/89f108ad-6ddd-4147-92cc-70800a0e7ec7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Accessibility and Forms: The Missing Piece of ADA Compliance with Adobe</itunes:title>
      <itunes:author>Adobe, Carahsoft</itunes:author>
      <itunes:duration>00:28:46</itunes:duration>
      <itunes:summary>In this podcast, hear insights from industry experts about key accessibility requirements as described in the Web Content Accessibility Guidelines (WCAG) 2.1. Specifically, this session will provide: Tips to help your agency determine how compliant you are today and formulate a plan to make all online forms accessible and compliant, Insights on utilizing Adobe Experience Manager (AEM) Forms for enterprise PDF creation to ensure compliance. Don&apos;t miss this opportunity to learn how to eliminate your agency&apos;s risk and provide citizens and employees with a seamless, 100% digital forms experience.</itunes:summary>
      <itunes:subtitle>In this podcast, hear insights from industry experts about key accessibility requirements as described in the Web Content Accessibility Guidelines (WCAG) 2.1. Specifically, this session will provide: Tips to help your agency determine how compliant you are today and formulate a plan to make all online forms accessible and compliant, Insights on utilizing Adobe Experience Manager (AEM) Forms for enterprise PDF creation to ensure compliance. Don&apos;t miss this opportunity to learn how to eliminate your agency&apos;s risk and provide citizens and employees with a seamless, 100% digital forms experience.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>101</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2b29175d-506b-46c4-935f-5067ff81a225</guid>
      <title>Chief Data Officers Digital Roundtable: The AI Era In Government</title>
      <description><![CDATA[<p>Carahsoft and FedInsider partnered to bring together a panel of Chief Data Officers and industry leaders for a dynamic discussion around the evolving challenges surrounding Data as a Strategic Asset. Our CDO Panel discussed the burgeoning use of artificial intelligence (AI) and how it is spurring invention and innovation across many sectors, including:</p><ul><li>Science, where AI is accelerating discovery;</li><li>Education and the development of individualized curriculum</li><li>Space through autonomous spacecraft and smart habitats</li><li>Healthcare using sensors and smart micro-systems</li><li>Smart Cities to reduce cost, enhance safety, and ensure environmental standards</li><li>Military, intelligence and government through a wide variety of applications</li></ul>
]]></description>
      <pubDate>Fri, 4 Jun 2021 17:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, FedInsider, NVIDIA, Cloudera)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cdo-digital-roundtable-the-ai-era-in-government-pVeva2Br</link>
      <content:encoded><![CDATA[<p>Carahsoft and FedInsider partnered to bring together a panel of Chief Data Officers and industry leaders for a dynamic discussion around the evolving challenges surrounding Data as a Strategic Asset. Our CDO Panel discussed the burgeoning use of artificial intelligence (AI) and how it is spurring invention and innovation across many sectors, including:</p><ul><li>Science, where AI is accelerating discovery;</li><li>Education and the development of individualized curriculum</li><li>Space through autonomous spacecraft and smart habitats</li><li>Healthcare using sensors and smart micro-systems</li><li>Smart Cities to reduce cost, enhance safety, and ensure environmental standards</li><li>Military, intelligence and government through a wide variety of applications</li></ul>
]]></content:encoded>
      <enclosure length="81049055" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8e526dc4-abb4-46b7-b6db-bf3e9a9c2ca7/audio/928d4013-4bc8-4d3b-ae54-f88e2c6664fd/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Chief Data Officers Digital Roundtable: The AI Era In Government</itunes:title>
      <itunes:author>Carahsoft, FedInsider, NVIDIA, Cloudera</itunes:author>
      <itunes:duration>01:24:25</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>machine learning, military, space, artificial intelligence, education, smart cities, cdo digital roundtable, cdo, science, chief data officer, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5497dd00-2075-4067-a895-2e864d925537</guid>
      <title>Fireside Chat with Deputy Director Nitin Natarajan and the Coalition for City CISOs - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, Co-chairs for the Coalition of City CISOs, Greg McCarthy and Michael Makstman will continue the discussion with Deputy Director Nitin Natarajan around cybersecurity and the importance of the public sector. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/fireside-chat-with-deputy-director-nitin-natarajan-and-the-coalition-for-city-cisos-rsa-public-sector-day-2021-KBO_bTXh</link>
      <enclosure length="34756325" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e7aa3fd6-d24d-4047-a5dc-c8af1564d83a/audio/7bb70616-ef0b-4db3-b8c1-c14ddd3998b4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Fireside Chat with Deputy Director Nitin Natarajan and the Coalition for City CISOs - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:36:13</itunes:duration>
      <itunes:summary>In this podcast, Co-chairs for the Coalition of City CISOs, Greg McCarthy and Michael Makstman will continue the discussion with Deputy Director Nitin Natarajan around cybersecurity and the importance of the public sector.</itunes:summary>
      <itunes:subtitle>In this podcast, Co-chairs for the Coalition of City CISOs, Greg McCarthy and Michael Makstman will continue the discussion with Deputy Director Nitin Natarajan around cybersecurity and the importance of the public sector.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c0bd4602-df81-499b-8e07-4b8eb22ddc0f</guid>
      <title>Government Resiliency: Yesterday, Today, and Tomorrow - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, industry leaders discuss Government Resiliency including their definitions of resiliency as it relates to cybersecurity, how resiliency has changed over the years, and how to reduce and manage complexities as you build resiliency. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/government-resiliency-yesterday-today-and-tomorrow-rsa-public-sector-day-2021-WyR7FpF1</link>
      <enclosure length="44878461" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/8853707d-0346-4306-988c-b855ccdc5143/audio/2c1f0136-c07e-45d8-8ab9-81e75845c428/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Government Resiliency: Yesterday, Today, and Tomorrow - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:46:45</itunes:duration>
      <itunes:summary>In this podcast, industry leaders discuss Government Resiliency including their definitions of resiliency as it relates to cybersecurity, how resiliency has changed over the years, and how to reduce and manage complexities as you build resiliency.</itunes:summary>
      <itunes:subtitle>In this podcast, industry leaders discuss Government Resiliency including their definitions of resiliency as it relates to cybersecurity, how resiliency has changed over the years, and how to reduce and manage complexities as you build resiliency.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dcd5597e-433d-45e2-be53-110d5f825ba7</guid>
      <title>Federal and State Keynote with Dave McKewon - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, Dave McKewon, Deputy Chief Information Officer for Cybersecurity & Senior Information Security Officer, Department of Defense (DoD), will discuss how the DoD has evolved their cyber defenses over the years to lay the ground work for zero trust. He will also cover how the DoD is approaching the challenge of implementing this new framework across the DoD information network and how this paradigm shift will serve as one of the most significant cyber defense game changers in the Department’s history. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/federal-and-state-keynote-with-dave-mckewon-rsa-public-sector-day-2021-TfeyCAG7</link>
      <enclosure length="15867078" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d9f45448-b111-4d00-a73b-c0296e597008/audio/cfa29f34-ac3c-4355-845a-349c1db555ad/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Federal and State Keynote with Dave McKewon - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:16:32</itunes:duration>
      <itunes:summary>In this podcast, Dave McKewon, Deputy Chief Information Officer for Cybersecurity &amp; Senior Information Security Officer, Department of Defense (DoD), will discuss how the DoD has evolved their cyber defenses over the years to lay the ground work for zero trust. He will also cover how the DoD is approaching the challenge of implementing this new framework across the DoD information network and how this paradigm shift will serve as one of the most significant cyber defense game changers in the Department’s history.</itunes:summary>
      <itunes:subtitle>In this podcast, Dave McKewon, Deputy Chief Information Officer for Cybersecurity &amp; Senior Information Security Officer, Department of Defense (DoD), will discuss how the DoD has evolved their cyber defenses over the years to lay the ground work for zero trust. He will also cover how the DoD is approaching the challenge of implementing this new framework across the DoD information network and how this paradigm shift will serve as one of the most significant cyber defense game changers in the Department’s history.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">572c6750-aab6-4694-80c7-79e76c04eb7a</guid>
      <title>Government Supply Chain: Not Just an Afterthought Anymore - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, industry leaders from the National Institute of Science and Technology (NIST), NASA, and the Department of Defense, will discuss the importance of supply chain security for every organization and ways to ensure your organization is secure, every step of the way. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/government-supply-chain-not-just-an-afterthought-anymore-rsa-public-sector-day-2021-ABhhfXGY</link>
      <enclosure length="50884116" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9449df81-7a78-4d27-beaa-c6454b07eb22/audio/376ce4e9-58cc-4638-9b91-570c3618a6b3/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Government Supply Chain: Not Just an Afterthought Anymore - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:53:01</itunes:duration>
      <itunes:summary>In this podcast, industry leaders from the National Institute of Science and Technology (NIST), NASA, and the Department of Defense, will discuss the importance of supply chain security for every organization and ways to ensure your organization is secure, every step of the way.</itunes:summary>
      <itunes:subtitle>In this podcast, industry leaders from the National Institute of Science and Technology (NIST), NASA, and the Department of Defense, will discuss the importance of supply chain security for every organization and ways to ensure your organization is secure, every step of the way.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3b874233-e9b9-44d9-88e8-5172f63548f4</guid>
      <title>Local Government Keynote with Deputy Director, Nitin Natarajan - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, Deputy Director, Nitin Natarajan, explains the importance of public sector as it relates to cybersecurity. As the industry continues to move forward to address huge challenges the public sector faces, the partnership of organizations is more important than ever. After listening to this podcast, check out the Fireside Chat with Nitin Natarajan where co-chairs for the Coalition of City CISOs continue the conversation with the Deputy Director. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (RSA, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/local-government-keynote-with-deputy-director-nitin-natarajan-rsa-public-sector-day-2021-mgL_EvNi</link>
      <enclosure length="18691228" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/788e51a1-10af-481a-b272-7c134c46c7ba/audio/96c0b414-be96-4611-8aa5-6746efbc550e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Local Government Keynote with Deputy Director, Nitin Natarajan - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>RSA, Carahsoft</itunes:author>
      <itunes:duration>00:19:29</itunes:duration>
      <itunes:summary>In this podcast, Deputy Director, Nitin Natarajan, explains the importance of public sector as it relates to cybersecurity. As the industry continues to move forward to address huge challenges the public sector faces, the partnership of organizations is more important than ever. After listening to this podcast, check out the Fireside Chat with Nitin Natarajan where co-chairs for the Coalition of City CISOs continue the conversation with the Deputy Director.</itunes:summary>
      <itunes:subtitle>In this podcast, Deputy Director, Nitin Natarajan, explains the importance of public sector as it relates to cybersecurity. As the industry continues to move forward to address huge challenges the public sector faces, the partnership of organizations is more important than ever. After listening to this podcast, check out the Fireside Chat with Nitin Natarajan where co-chairs for the Coalition of City CISOs continue the conversation with the Deputy Director.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d8d6509c-48ee-44ae-9143-fe12dca586ab</guid>
      <title>Ransomware Aftershock: How to Recover and Stay Resilient - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, industry leaders from cybersecurity organizations including the Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (DHS CISA), will discuss the impact ransomware has on the public sector and ways to reduce those impacts. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ransomware-aftershock-how-to-recover-and-stay-resilient-rsa-public-sector-day-2021-1BGHCzZz</link>
      <enclosure length="36666817" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/867afbad-abdd-460c-9cd1-fac875efd68b/audio/a5b95e4a-79b6-4e15-909b-5438d462eb21/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ransomware Aftershock: How to Recover and Stay Resilient - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:38:12</itunes:duration>
      <itunes:summary>In this podcast, industry leaders from cybersecurity organizations including the Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (DHS CISA), will discuss the impact ransomware has on the public sector and ways to reduce those impacts.</itunes:summary>
      <itunes:subtitle>In this podcast, industry leaders from cybersecurity organizations including the Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (DHS CISA), will discuss the impact ransomware has on the public sector and ways to reduce those impacts.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8ed01a61-3bdf-40af-a5b9-8a4889db44b2</guid>
      <title>Cybersecurity Needs Diversity: Local Government Challenges and Opportunities - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, industry leaders will discuss their personal experiences with diversity in the public sector, discuss the immense benefits of a diverse workforce in the cybersecurity industry, as well as offer insights into how the industry can further strengthen their diversity. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cybersecurity-needs-diversity-local-government-challenges-and-opportunities-rsa-public-sector-day-2021-9u_Jcyft</link>
      <enclosure length="40410059" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ebbbabda-f6d7-4cfc-a310-0cf199a181cc/audio/0f9e8f94-fa09-4815-8710-c97a5740374e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cybersecurity Needs Diversity: Local Government Challenges and Opportunities - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:42:06</itunes:duration>
      <itunes:summary>In this podcast, industry leaders will discuss their personal experiences with diversity in the public sector, discuss the immense benefits of a diverse workforce in the cybersecurity industry, as well as offer insights into how the industry can further strengthen their diversity.</itunes:summary>
      <itunes:subtitle>In this podcast, industry leaders will discuss their personal experiences with diversity in the public sector, discuss the immense benefits of a diverse workforce in the cybersecurity industry, as well as offer insights into how the industry can further strengthen their diversity.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c6ee2d10-58ae-420a-a730-d2eed32e2d2b</guid>
      <title>Cybersecurity in a Post Pandemic World - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, RSA Chief Technology and Product Officer, Zulfikar Ramzan, will address the challenges and opportunities of cybersecurity in a post pandemic world including where the industry has been and where it needs to go. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (RSA, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/cybersecurity-in-a-post-pandemic-world-rsa-public-sector-day-2021-N8KOEnR6</link>
      <enclosure length="20385635" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/05d0bef9-8ce3-4f62-ac6c-dd55475c4d3f/audio/e3c517e2-f22c-4f8b-9e74-cbf8370833d3/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Cybersecurity in a Post Pandemic World - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>RSA, Carahsoft</itunes:author>
      <itunes:duration>00:21:15</itunes:duration>
      <itunes:summary>In this podcast, RSA Chief Technology and Product Officer, Zulfikar Ramzan, will address the challenges and opportunities of cybersecurity in a post pandemic world including where the industry has been and where it needs to go.</itunes:summary>
      <itunes:subtitle>In this podcast, RSA Chief Technology and Product Officer, Zulfikar Ramzan, will address the challenges and opportunities of cybersecurity in a post pandemic world including where the industry has been and where it needs to go.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d71b6b2d-1912-4016-a62d-ecc2e3934657</guid>
      <title>And That’s a Wrap! RSA Public Sector Day 2021 Recap</title>
      <description><![CDATA[In this special condensed podcast, Bruce Coffing, Chief Information Security Officer (CISO) for the City of Chicago, and Chris Covino, Policy Director for Cybersecurity for the City of Los Angeles, will summarize the insightful thoughts from the Local Government Track at RSA Public Sector Day 2021. Some topics will include the Department of Homeland Security’s Deputy Director, Nitin Natarajan’s “magic checkbook”, the importance of planning for ransomware attacks, and the benefit of expanded definitions of diversity. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, RSA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/and-thats-a-wrap-rsa-public-sector-day-2021-recap-uPuuC0nj</link>
      <enclosure length="21398350" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/97ddd86d-efb9-4406-86ef-892babc2e019/audio/8fdd0896-9169-4692-a199-b6a6444c3478/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>And That’s a Wrap! RSA Public Sector Day 2021 Recap</itunes:title>
      <itunes:author>Carahsoft, RSA</itunes:author>
      <itunes:duration>00:22:18</itunes:duration>
      <itunes:summary>In this special condensed podcast, Bruce Coffing, Chief Information Security Officer (CISO) for the City of Chicago, and Chris Covino, Policy Director for Cybersecurity for the City of Los Angeles, will summarize the insightful thoughts from the Local Government Track at RSA Public Sector Day 2021. Some topics will include the Department of Homeland Security’s Deputy Director, Nitin Natarajan’s “magic checkbook”, the importance of planning for ransomware attacks, and the benefit of expanded definitions of diversity.</itunes:summary>
      <itunes:subtitle>In this special condensed podcast, Bruce Coffing, Chief Information Security Officer (CISO) for the City of Chicago, and Chris Covino, Policy Director for Cybersecurity for the City of Los Angeles, will summarize the insightful thoughts from the Local Government Track at RSA Public Sector Day 2021. Some topics will include the Department of Homeland Security’s Deputy Director, Nitin Natarajan’s “magic checkbook”, the importance of planning for ransomware attacks, and the benefit of expanded definitions of diversity.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5e3e4110-fff3-4e9d-9d0d-c3fc82cf317d</guid>
      <title>Government Cloud and Digital Modernization Challenges and Opportunities - RSA Public Sector Day 2021</title>
      <description><![CDATA[In this podcast, industry leaders from various public sector organizations will discuss the challenges and opportunities that present themselves as more and more organizations migrate to the cloud in an effort to enhance digital modernization. 
]]></description>
      <pubDate>Thu, 3 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (RSA, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/government-cloud-and-digital-modernization-challenges-and-opportunities-rsa-public-sector-day-2021-swTeUsef</link>
      <enclosure length="45303943" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/01c33258-e8d3-44a8-845b-9201f3a92bff/audio/478cb365-9842-4397-92f6-9e6a4a67f8f6/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Government Cloud and Digital Modernization Challenges and Opportunities - RSA Public Sector Day 2021</itunes:title>
      <itunes:author>RSA, Carahsoft</itunes:author>
      <itunes:duration>00:47:12</itunes:duration>
      <itunes:summary>In this podcast, industry leaders from various public sector organizations will discuss the challenges and opportunities that present themselves as more and more organizations migrate to the cloud in an effort to enhance digital modernization.</itunes:summary>
      <itunes:subtitle>In this podcast, industry leaders from various public sector organizations will discuss the challenges and opportunities that present themselves as more and more organizations migrate to the cloud in an effort to enhance digital modernization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f6fdb39-433f-4502-9b74-3fe1a81da6ef</guid>
      <title>Consolidate &amp; Control Your Unstructured Data with Nutanix</title>
      <description><![CDATA[Listen to Kelly Olivier, Principal Architect at Nutanix, discuss how to intelligently manage and share unstructured data to help your business make informed decisions.

 
]]></description>
      <pubDate>Tue, 1 Jun 2021 19:07:10 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/consolidate-control-your-unstructured-data-with-nutanix-IUZ_G9Ck</link>
      <enclosure length="24727332" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7fd6bada-faf8-4139-97a3-6e50468b6119/audio/e8f1729a-1259-4c99-b2b1-a94554107c97/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Consolidate &amp; Control Your Unstructured Data with Nutanix</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:25:44</itunes:duration>
      <itunes:summary>Listen to Kelly Olivier, Principal Architect at Nutanix, discuss how to intelligently manage and share unstructured data to help your business make informed decisions.

</itunes:summary>
      <itunes:subtitle>Listen to Kelly Olivier, Principal Architect at Nutanix, discuss how to intelligently manage and share unstructured data to help your business make informed decisions.

</itunes:subtitle>
      <itunes:keywords>cloud, government, technology, data, it, public sector</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">92856f69-d796-4bde-9065-d9faaf0c1a63</guid>
      <title>Evolving Your Posture for Emerging Ransomware Trends with Trustwave</title>
      <description><![CDATA[According to Gartner, 90 percent of ransomware attacks can be prevented. Don't be part of the 10 percent – learn how hackers are defeating your ransomware tools. Hear from Grayson Lenik, Cybersecurity Expert at Trustwave Government Solutions, as he shares the evolution of ransomware, Red Team simulation against ransomware tools, and a case study of a recent ransomware attack. 
]]></description>
      <pubDate>Tue, 1 Jun 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Trustwave, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/evolving-your-posture-for-emerging-ransomware-trends-with-trustwave-j7Mry99f</link>
      <enclosure length="32863388" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/175145f9-3344-434a-bea2-c0449ac1c00a/audio/1aa1749e-9ed0-4c78-a854-99af107a07d7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Evolving Your Posture for Emerging Ransomware Trends with Trustwave</itunes:title>
      <itunes:author>Trustwave, Carahsoft</itunes:author>
      <itunes:duration>00:34:14</itunes:duration>
      <itunes:summary>According to Gartner, 90 percent of ransomware attacks can be prevented. Don&apos;t be part of the 10 percent – learn how hackers are defeating your ransomware tools. Hear from Grayson Lenik, Cybersecurity Expert at Trustwave Government Solutions, as he shares the evolution of ransomware, Red Team simulation against ransomware tools, and a case study of a recent ransomware attack.</itunes:summary>
      <itunes:subtitle>According to Gartner, 90 percent of ransomware attacks can be prevented. Don&apos;t be part of the 10 percent – learn how hackers are defeating your ransomware tools. Hear from Grayson Lenik, Cybersecurity Expert at Trustwave Government Solutions, as he shares the evolution of ransomware, Red Team simulation against ransomware tools, and a case study of a recent ransomware attack.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>89</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1dfa6afc-8099-41f6-802b-170f66c34054</guid>
      <title>Security and Compliance with Cloudnexa</title>
      <description><![CDATA[In this podcast, MJ DiBerardino, CEO at Cloudnexa, discusses compliant migrations into the AWS Cloud for federal customers and the importance of moving workloads to the Cloud. 
]]></description>
      <pubDate>Fri, 28 May 2021 18:10:14 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, AWS, Amazon Web Services, Cloudnexa)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/security-and-compliance-with-cloudnexa-sM7puF62</link>
      <enclosure length="13309402" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/227eee60-96cd-4aba-a452-df9ab593215d/audio/c6224999-6685-461e-a6ae-dc978c1568cb/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Security and Compliance with Cloudnexa</itunes:title>
      <itunes:author>Carahsoft, AWS, Amazon Web Services, Cloudnexa</itunes:author>
      <itunes:duration>00:13:51</itunes:duration>
      <itunes:summary>In this podcast, MJ DiBerardino, CEO at Cloudnexa, discusses compliant migrations into the AWS Cloud for federal customers and the importance of moving workloads to the Cloud.</itunes:summary>
      <itunes:subtitle>In this podcast, MJ DiBerardino, CEO at Cloudnexa, discusses compliant migrations into the AWS Cloud for federal customers and the importance of moving workloads to the Cloud.</itunes:subtitle>
      <itunes:keywords>cloud, technology, it, federal</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db997e4d-1ddf-499f-a77f-1b6199332b36</guid>
      <title>Modernize Cloud &amp; Cyber Posture with Secure Multicloud-as-a-Service (MCaaS) with Rackspace</title>
      <description><![CDATA[Agencies at all levels are under pressure to evolve their cybersecurity posture from a passive to a more active strategy. To accomplish that, they must modernize from static, on-prem, physical IT to a multicloud strategy - taking advantage of the power that public and private cloud can provide.

Listen to Lorenzo Winfrey, Senior Product Manager at Rackspace Technology; Phil Fuster, Senior Director at Rackspace Technology; and James Stanger, Chief Technology Evangelist at CompTIAdiscuss how secure Multicloud-as-a-Service (MCaaS) solutions provide the necessary tools to comprehensively address cloud security across multiple technologies and help agencies craft the right strategy to support the mission. 
]]></description>
      <pubDate>Thu, 27 May 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Rackspace)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernize-cloud-cyber-posture-with-secure-multicloud-as-a-service-mcaas-with-rackspace-rXuXt7hb</link>
      <enclosure length="57912936" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5d25fb75-44bf-4ce7-9a3b-a9df6f760a02/audio/209e793c-aa26-4245-841b-e57a03e24ef0/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernize Cloud &amp; Cyber Posture with Secure Multicloud-as-a-Service (MCaaS) with Rackspace</itunes:title>
      <itunes:author>Carahsoft, Rackspace</itunes:author>
      <itunes:duration>01:00:20</itunes:duration>
      <itunes:summary>Agencies at all levels are under pressure to evolve their cybersecurity posture from a passive to a more active strategy. To accomplish that, they must modernize from static, on-prem, physical IT to a multicloud strategy - taking advantage of the power that public and private cloud can provide.

Listen to Lorenzo Winfrey, Senior Product Manager at Rackspace Technology; Phil Fuster, Senior Director at Rackspace Technology; and James Stanger, Chief Technology Evangelist at CompTIAdiscuss how secure Multicloud-as-a-Service (MCaaS) solutions provide the necessary tools to comprehensively address cloud security across multiple technologies and help agencies craft the right strategy to support the mission.</itunes:summary>
      <itunes:subtitle>Agencies at all levels are under pressure to evolve their cybersecurity posture from a passive to a more active strategy. To accomplish that, they must modernize from static, on-prem, physical IT to a multicloud strategy - taking advantage of the power that public and private cloud can provide.

Listen to Lorenzo Winfrey, Senior Product Manager at Rackspace Technology; Phil Fuster, Senior Director at Rackspace Technology; and James Stanger, Chief Technology Evangelist at CompTIAdiscuss how secure Multicloud-as-a-Service (MCaaS) solutions provide the necessary tools to comprehensively address cloud security across multiple technologies and help agencies craft the right strategy to support the mission.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">76f5580d-9875-4399-94e2-678260f92ff7</guid>
      <title>Identity 101: A Customer’s Journey to a Modern Identity Platform with Okta</title>
      <description><![CDATA[Listen to our Carahsoft podcast featuring Okta and Netsync for an opportunity to hear from your peer, David Potter, Sr. Manager of ESD, as he discusses his journey to achieving a modern identity platform for Tampa International Airport. 
]]></description>
      <pubDate>Mon, 24 May 2021 13:59:52 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Okta, Carahsoft, Tampa International Airport, Netsync)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/identity-101-a-customers-journey-to-a-modern-identity-platform-with-okta-P8wZLT9O</link>
      <enclosure length="34501950" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/de2d289f-85a7-41e7-87e1-89c3051dec76/audio/6c19a6f5-9f3c-451b-a2bb-4b98ab4f68b1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Identity 101: A Customer’s Journey to a Modern Identity Platform with Okta</itunes:title>
      <itunes:author>Okta, Carahsoft, Tampa International Airport, Netsync</itunes:author>
      <itunes:duration>00:35:54</itunes:duration>
      <itunes:summary>Listen to our Carahsoft podcast featuring Okta and Netsync for an opportunity to hear from your peer, David Potter, Sr. Manager of ESD, as he discusses his journey to achieving a modern identity platform for Tampa International Airport.</itunes:summary>
      <itunes:subtitle>Listen to our Carahsoft podcast featuring Okta and Netsync for an opportunity to hear from your peer, David Potter, Sr. Manager of ESD, as he discusses his journey to achieving a modern identity platform for Tampa International Airport.</itunes:subtitle>
      <itunes:keywords>technology, identity, it</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d18102d4-6f83-4e46-994f-1aa42f9c959a</guid>
      <title>Accelerating Data Disruption with Snowflake</title>
      <description><![CDATA[In this podcast you will hear how:

Snowflake enables a centralized and secure single source of truth for all data
Snowflake and Deloitte enable agencies to instantly and securely share governed data
Agencies can leverage Snowflake and Deloitte's solution to enable self-service analytics and data-driven decision making while maintaining required compliance standards 
]]></description>
      <pubDate>Mon, 24 May 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (carahsoft, snowflake)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/accelerating-data-disruption-with-snowflake-VT3V5t_C</link>
      <enclosure length="36280623" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e62b27d5-4ba5-4435-8a85-7950c02d2190/audio/17728176-3489-4543-801f-a9e65b5d33a1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Accelerating Data Disruption with Snowflake</itunes:title>
      <itunes:author>carahsoft, snowflake</itunes:author>
      <itunes:duration>00:37:48</itunes:duration>
      <itunes:summary>In this podcast you will hear how:

Snowflake enables a centralized and secure single source of truth for all data
Snowflake and Deloitte enable agencies to instantly and securely share governed data
Agencies can leverage Snowflake and Deloitte&apos;s solution to enable self-service analytics and data-driven decision making while maintaining required compliance standards</itunes:summary>
      <itunes:subtitle>In this podcast you will hear how:

Snowflake enables a centralized and secure single source of truth for all data
Snowflake and Deloitte enable agencies to instantly and securely share governed data
Agencies can leverage Snowflake and Deloitte&apos;s solution to enable self-service analytics and data-driven decision making while maintaining required compliance standards</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">51bec241-7160-4737-b0b3-bedf68692220</guid>
      <title>Legacy Modernization with FedInsider’s Industry Panel</title>
      <description><![CDATA[Listen as industry leaders share their insights and strategies for increasing the accessibility and functionality of the digital government. 
]]></description>
      <pubDate>Fri, 21 May 2021 18:45:33 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (FedInsider, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/legacy-modernization-with-fedinsiders-industry-panel-_BZ2KjU3</link>
      <enclosure length="52428492" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e8da6430-c40b-459a-be26-f6dc9d5320d3/audio/d3d166b7-1748-4849-9263-f9c68dc52806/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Legacy Modernization with FedInsider’s Industry Panel</itunes:title>
      <itunes:author>FedInsider, Carahsoft</itunes:author>
      <itunes:duration>00:54:35</itunes:duration>
      <itunes:summary>Listen as industry leaders share their insights and strategies for increasing the accessibility and functionality of the digital government.</itunes:summary>
      <itunes:subtitle>Listen as industry leaders share their insights and strategies for increasing the accessibility and functionality of the digital government.</itunes:subtitle>
      <itunes:keywords>technology, it, digital government</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56ece8c5-a0d0-462f-92dc-a27281fe7262</guid>
      <title>Legacy Modernization with Google Cloud</title>
      <description><![CDATA[Listen as industry leaders discuss the use of Big Data in business intelligence and analytics, the impact of collaboration technologies on data proliferation and management, and the emergence of data-driven citizen services in the wake of the pandemic. 
]]></description>
      <pubDate>Fri, 21 May 2021 18:30:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Google Cloud, Carahsoft, Google)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/legacy-modernization-with-google-cloud-3cOCjveo</link>
      <enclosure length="52635779" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/db3799c0-d025-4a8f-bb6f-8c77a76e00a3/audio/c3a6ab1b-5802-4487-a976-a32ef2f92f8e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Legacy Modernization with Google Cloud</itunes:title>
      <itunes:author>Google Cloud, Carahsoft, Google</itunes:author>
      <itunes:duration>00:54:48</itunes:duration>
      <itunes:summary>Listen as industry leaders discuss the use of Big Data in business intelligence and analytics, the impact of collaboration technologies on data proliferation and management, and the emergence of data-driven citizen services in the wake of the pandemic.</itunes:summary>
      <itunes:subtitle>Listen as industry leaders discuss the use of Big Data in business intelligence and analytics, the impact of collaboration technologies on data proliferation and management, and the emergence of data-driven citizen services in the wake of the pandemic.</itunes:subtitle>
      <itunes:keywords>technology, it, pandemic, covid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">33754d8b-5808-4754-8143-24ecea08afac</guid>
      <title>Legacy Modernization with SolarWinds</title>
      <description><![CDATA[Listen as industry leaders share ways they have assisted state and local governments address both the direct impacts of the pandemic and the gaps and shortfalls brought to light. 
]]></description>
      <pubDate>Fri, 21 May 2021 18:17:52 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, SolarWinds)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/legacy-modernization-with-solarwinds-dvfuHbTf</link>
      <enclosure length="48064513" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0390661a-e1e3-4333-90a7-fd7fe4f4da8e/audio/36009865-d90b-4fdd-8409-32ab3ce74b16/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Legacy Modernization with SolarWinds</itunes:title>
      <itunes:author>Carahsoft, SolarWinds</itunes:author>
      <itunes:duration>00:50:02</itunes:duration>
      <itunes:summary>Listen as industry leaders share ways they have assisted state and local governments address both the direct impacts of the pandemic and the gaps and shortfalls brought to light.</itunes:summary>
      <itunes:subtitle>Listen as industry leaders share ways they have assisted state and local governments address both the direct impacts of the pandemic and the gaps and shortfalls brought to light.</itunes:subtitle>
      <itunes:keywords>government, technology, it, covid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">595117c4-bd71-404f-a914-0136565fd0a9</guid>
      <title>Legacy Modernization with FedInsider’s Government Panel</title>
      <description><![CDATA[Listen to this examination of the strategies governments and technology companies are using to modernize technology to increase the accessibility and functionality of digital citizen services. 
]]></description>
      <pubDate>Fri, 21 May 2021 18:01:41 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (FedInsider, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/legacy-modernization-with-fedinsiders-government-panel-aniHA_OY</link>
      <enclosure length="52474635" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/db2d37cf-dea8-48c3-98cf-022896e861dd/audio/5dfc551c-e44d-45fe-995e-10523be4c752/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Legacy Modernization with FedInsider’s Government Panel</itunes:title>
      <itunes:author>FedInsider, Carahsoft</itunes:author>
      <itunes:duration>00:54:38</itunes:duration>
      <itunes:summary>Listen to this examination of the strategies governments and technology companies are using to modernize technology to increase the accessibility and functionality of digital citizen services.</itunes:summary>
      <itunes:subtitle>Listen to this examination of the strategies governments and technology companies are using to modernize technology to increase the accessibility and functionality of digital citizen services.</itunes:subtitle>
      <itunes:keywords>government, technology, it</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">95e93457-ea45-4ddc-8fe6-1085bb6a249d</guid>
      <title>Future-Proof Your Vaccine Management Plan with Salesforce, DocuSign, and OwnBackup</title>
      <description><![CDATA[During this panel, the experts discussed what policies should companies have in place for their vaccine rollout, should companies mandate that their employees be vaccinated, and how can Vaccine Cloud be leveraged beyond COVID-19? 
]]></description>
      <pubDate>Thu, 20 May 2021 20:28:32 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Salesforce, Carahsoft, DocuSign, OwnBackup)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/future-proof-your-vaccine-management-plan-with-salesforce-docusign-and-ownbackup-STQoy8xl</link>
      <enclosure length="24079313" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b5d9492c-cd82-4def-8977-f1c1cfc52b54/audio/b1728028-e081-4906-9f86-b73b76bb47a1/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Future-Proof Your Vaccine Management Plan with Salesforce, DocuSign, and OwnBackup</itunes:title>
      <itunes:author>Salesforce, Carahsoft, DocuSign, OwnBackup</itunes:author>
      <itunes:duration>00:25:02</itunes:duration>
      <itunes:summary>During this panel, the experts discussed what policies should companies have in place for their vaccine rollout, should companies mandate that their employees be vaccinated, and how can Vaccine Cloud be leveraged beyond COVID-19?</itunes:summary>
      <itunes:subtitle>During this panel, the experts discussed what policies should companies have in place for their vaccine rollout, should companies mandate that their employees be vaccinated, and how can Vaccine Cloud be leveraged beyond COVID-19?</itunes:subtitle>
      <itunes:keywords>vaccine cloud, cloud, technology, vaccines, it, covid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d701147-dac3-4a5f-b6df-ac402523033e</guid>
      <title>Conquering Data Warehouse Challenges in Higher Education with Snowflake</title>
      <description><![CDATA[Learn how Auburn changed the "data mindset" across campus while building a solid foundation and a repeatable process to scale its data warehouse as its needs continue to grow. Hear from the core project team about the best practices to make data warehouse projects successful and how Snowflake enables a centralized and secure single source of truth for all data. 
]]></description>
      <pubDate>Wed, 12 May 2021 04:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Snowflake)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/conquering-data-warehouse-challenges-in-higher-education-with-snowflake-9GZY2_Pq</link>
      <enclosure length="47964672" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b934f3f5-6639-4f70-bbc0-e7cfca08abba/audio/f85fda6a-18d8-4d98-963e-12c69c71eea4/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Conquering Data Warehouse Challenges in Higher Education with Snowflake</itunes:title>
      <itunes:author>Carahsoft, Snowflake</itunes:author>
      <itunes:duration>00:49:58</itunes:duration>
      <itunes:summary>Learn how Auburn changed the &quot;data mindset&quot; across campus while building a solid foundation and a repeatable process to scale its data warehouse as its needs continue to grow. Hear from the core project team about the best practices to make data warehouse projects successful and how Snowflake enables a centralized and secure single source of truth for all data.</itunes:summary>
      <itunes:subtitle>Learn how Auburn changed the &quot;data mindset&quot; across campus while building a solid foundation and a repeatable process to scale its data warehouse as its needs continue to grow. Hear from the core project team about the best practices to make data warehouse projects successful and how Snowflake enables a centralized and secure single source of truth for all data.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3afd7cf3-9fbb-478f-a935-7f2ec2d6b6b3</guid>
      <title>Protecting the Public Through Effective Communication with BlackBerry</title>
      <description><![CDATA[In this podcast, BlackBerry discusses how the AtHoc solution provides secure and reliable communications to protect and reach the public community from a centralized and common operating picture. 
]]></description>
      <pubDate>Tue, 4 May 2021 13:42:03 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, BlackBerry)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/protecting-the-public-through-effective-communication-with-blackberry-w9wM0ge4</link>
      <enclosure length="41141461" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ca84e495-1d71-4038-8bf3-4a7946183970/audio/1452b2b9-b1e8-43cb-8014-9c18691d72fc/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Protecting the Public Through Effective Communication with BlackBerry</itunes:title>
      <itunes:author>Carahsoft, BlackBerry</itunes:author>
      <itunes:duration>00:42:50</itunes:duration>
      <itunes:summary>In this podcast, BlackBerry discusses how the AtHoc solution provides secure and reliable communications to protect and reach the public community from a centralized and common operating picture.</itunes:summary>
      <itunes:subtitle>In this podcast, BlackBerry discusses how the AtHoc solution provides secure and reliable communications to protect and reach the public community from a centralized and common operating picture.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">67e4af94-341e-4452-8dbb-70d1e2468926</guid>
      <title>Unleash Your Data with Nutanix for Splunk</title>
      <description><![CDATA[Listen to Kanuj Behl, Cloud Architect at Nutanix, discuss how Nutanix provides simplicity, stability, and scalability for Splunk deployments. 
]]></description>
      <pubDate>Wed, 28 Apr 2021 14:49:27 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Nutanix)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unleash-your-data-with-nutanix-for-splunk-phhq9V1c</link>
      <enclosure length="18401361" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7f7aa6f0-27f7-403e-acb8-c2d2c212379f/audio/6d0323e3-4846-42b6-8141-e54ceaf0d099/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unleash Your Data with Nutanix for Splunk</itunes:title>
      <itunes:author>Carahsoft, Nutanix</itunes:author>
      <itunes:duration>00:19:09</itunes:duration>
      <itunes:summary>Listen to Kanuj Behl, Cloud Architect at Nutanix, discuss how Nutanix provides simplicity, stability, and scalability for Splunk deployments.</itunes:summary>
      <itunes:subtitle>Listen to Kanuj Behl, Cloud Architect at Nutanix, discuss how Nutanix provides simplicity, stability, and scalability for Splunk deployments.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0ca304e0-f93b-4f52-8e39-52630c1df569</guid>
      <title>Transformation-Ready in Higher Education: Lessons from Leaders on Identity Modernization with Okta</title>
      <description><![CDATA[Hear directly from other campus leaders as they share their journeys to improve identity access and security systems, and learn how your campus can adopt similar strategies for student and campus success. 
]]></description>
      <pubDate>Wed, 21 Apr 2021 14:45:02 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Okta, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/transformation-ready-in-higher-education-lessons-from-leaders-on-identity-modernization-with-okta-6D6U6_fa</link>
      <enclosure length="42458571" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/1c44bd86-c920-466d-8bc1-e8b9510d97b1/audio/b174dcfd-dfa9-4d39-ac35-9e0cbfe5c397/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Transformation-Ready in Higher Education: Lessons from Leaders on Identity Modernization with Okta</itunes:title>
      <itunes:author>Okta, Carahsoft</itunes:author>
      <itunes:duration>00:44:10</itunes:duration>
      <itunes:summary>Hear directly from other campus leaders as they share their journeys to improve identity access and security systems, and learn how your campus can adopt similar strategies for student and campus success.</itunes:summary>
      <itunes:subtitle>Hear directly from other campus leaders as they share their journeys to improve identity access and security systems, and learn how your campus can adopt similar strategies for student and campus success.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">81962e9b-be10-4a09-8add-a48ad514b282</guid>
      <title>Campus Reopening Solutions for Higher Education with Google Cloud</title>
      <description><![CDATA[In this podcast, Google Cloud’s Chris Haas, SpringML’s Sindhu Adini and Washington University in St. Louis’s Dr. Philip R.O. Payne discuss how a data-driven approach can help drive efficient campus reopening solutions for student and faculty wellness. 
]]></description>
      <pubDate>Mon, 19 Apr 2021 16:33:48 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, SpringML, Google Cloud, Washington University)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/campus-reopening-solutions-for-higher-education-with-google-cloud-jLw3JcCr</link>
      <enclosure length="50778693" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ca189951-b747-4954-b8b6-d8189ec2d9c7/audio/f2885f9e-632f-4845-862b-1f7b4e92ed11/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Campus Reopening Solutions for Higher Education with Google Cloud</itunes:title>
      <itunes:author>Carahsoft, SpringML, Google Cloud, Washington University</itunes:author>
      <itunes:duration>00:52:51</itunes:duration>
      <itunes:summary>In this podcast, Google Cloud’s Chris Haas, SpringML’s Sindhu Adini and Washington University in St. Louis’s Dr. Philip R.O. Payne discuss how a data-driven approach can help drive efficient campus reopening solutions for student and faculty wellness.</itunes:summary>
      <itunes:subtitle>In this podcast, Google Cloud’s Chris Haas, SpringML’s Sindhu Adini and Washington University in St. Louis’s Dr. Philip R.O. Payne discuss how a data-driven approach can help drive efficient campus reopening solutions for student and faculty wellness.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ff955b2e-22c5-42c2-914a-5461c5f2deff</guid>
      <title>Security Threats in the Healthcare Landscape Today with VMware</title>
      <description><![CDATA[In Carahsoft’s podcast, our featured speakers from the VMware Healthcare Industry Strategy team discuss how the threat landscape is changing, and how VMware acts to secure their customers. 
]]></description>
      <pubDate>Tue, 13 Apr 2021 14:04:50 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/security-threats-in-the-healthcare-landscape-today-with-vmware-oh_QfE18</link>
      <enclosure length="22507191" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b9472105-3bdb-4f50-820f-0ca90db2c35c/audio/ccd07827-c6b3-4d42-9d7d-baad30c3eb3d/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Security Threats in the Healthcare Landscape Today with VMware</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:23:23</itunes:duration>
      <itunes:summary>In Carahsoft’s podcast, our featured speakers from the VMware Healthcare Industry Strategy team discuss how the threat landscape is changing, and how VMware acts to secure their customers.</itunes:summary>
      <itunes:subtitle>In Carahsoft’s podcast, our featured speakers from the VMware Healthcare Industry Strategy team discuss how the threat landscape is changing, and how VMware acts to secure their customers.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">54d615f6-0906-4b4d-8615-c587b965b486</guid>
      <title>HashiCorp Vault + Venafi: Scaling in Production</title>
      <description><![CDATA[<p>As agencies continue to migrate to the cloud and adopt DevSecOps practices and tooling, the challenges to protect sensitive data (secrets) and ensure security policies are consistently applied and followed are tougher than ever. Together, Venafi and HashiCorp Vault make it easy for security teams to safeguard secrets and apply consistent policy while enabling development teams to consume those secrets while ensuring compliance. </p><p>Listen to the podcast and learn how HashiCorp Vault and Venafi can increase your Zero Trust security posture, establish policy and compliance guardrails, and seamlessly accelerate mission delivery.  </p><p>During this podcast, you will:</p><ul><li>Learn the three design patterns used by organizations in production</li><li>Learn from a real-world example and reference architecture</li><li>Understand the differences between each, and how they might apply to your infrastructure</li></ul>
]]></description>
      <pubDate>Fri, 9 Apr 2021 19:08:48 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Venafi, HashiCorp)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/hashicorp-vault-venafi-scaling-in-production-_0_0gvlF</link>
      <content:encoded><![CDATA[<p>As agencies continue to migrate to the cloud and adopt DevSecOps practices and tooling, the challenges to protect sensitive data (secrets) and ensure security policies are consistently applied and followed are tougher than ever. Together, Venafi and HashiCorp Vault make it easy for security teams to safeguard secrets and apply consistent policy while enabling development teams to consume those secrets while ensuring compliance. </p><p>Listen to the podcast and learn how HashiCorp Vault and Venafi can increase your Zero Trust security posture, establish policy and compliance guardrails, and seamlessly accelerate mission delivery.  </p><p>During this podcast, you will:</p><ul><li>Learn the three design patterns used by organizations in production</li><li>Learn from a real-world example and reference architecture</li><li>Understand the differences between each, and how they might apply to your infrastructure</li></ul>
]]></content:encoded>
      <enclosure length="25990880" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/90c8947f-73c7-426d-bfc1-490bade8dc8a/audio/d6716c6e-f4de-4c74-a409-5fae89a3699f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>HashiCorp Vault + Venafi: Scaling in Production</itunes:title>
      <itunes:author>Carahsoft, Venafi, HashiCorp</itunes:author>
      <itunes:duration>00:27:04</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>devsecops, hashicorp vault, zero trust, technology, scaling in production</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0bcb21bb-4d89-4192-a903-b1b727b0a098</guid>
      <title>Health Transformation Powered by Data Intelligence with Collibra</title>
      <description><![CDATA[In this podcast, a panel consisting of Dr. Barry Chaiken, the Clinical Chief at Tableau Software, Charles Gabrial, the Project Manager of Standards & Interoperability at The Federal Electronic Health Record Modernization, Cupid Chan the BI & AI Committee Chair of LF Data & AI at the Linux Foundation, and Chris Cooper, the AVP of Health and Education at Collibra highlight the value of data intelligence within the healthcare industry. 
]]></description>
      <pubDate>Tue, 6 Apr 2021 19:23:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Collibra, Carahsoft, Tableau Software, Federal Electronic The Health Record Modernization, Linux Foundation)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/health-transformation-powered-by-data-intelligence-with-collibra-Npp01W6z</link>
      <enclosure length="49591385" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/afd960b0-0005-464a-ac97-f8249103fb40/audio/f40677fd-2122-4bc4-9831-b560a77cff2b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Health Transformation Powered by Data Intelligence with Collibra</itunes:title>
      <itunes:author>Collibra, Carahsoft, Tableau Software, Federal Electronic The Health Record Modernization, Linux Foundation</itunes:author>
      <itunes:duration>00:51:38</itunes:duration>
      <itunes:summary>In this podcast, a panel consisting of Dr. Barry Chaiken, the Clinical Chief at Tableau Software, Charles Gabrial, the Project Manager of Standards &amp; Interoperability at The Federal Electronic Health Record Modernization, Cupid Chan the BI &amp; AI Committee Chair of LF Data &amp; AI at the Linux Foundation, and Chris Cooper, the AVP of Health and Education at Collibra highlight the value of data intelligence within the healthcare industry.</itunes:summary>
      <itunes:subtitle>In this podcast, a panel consisting of Dr. Barry Chaiken, the Clinical Chief at Tableau Software, Charles Gabrial, the Project Manager of Standards &amp; Interoperability at The Federal Electronic Health Record Modernization, Cupid Chan the BI &amp; AI Committee Chair of LF Data &amp; AI at the Linux Foundation, and Chris Cooper, the AVP of Health and Education at Collibra highlight the value of data intelligence within the healthcare industry.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3e3922fc-cb7f-4b01-92c7-79cb4dc4984a</guid>
      <title>Discover-Understand-Decide: How DOD is Driving Decisions From Data</title>
      <description><![CDATA[In this podcast, a panel consisting of Allyson Spring, the AVP for Federal at Collibra, Graham Evans, Principal at Booz Allen Hamilton, Howard Levenson, the General Manager for Federal at Databricks, and Brian Shealey, the VP of Public Sector at Trifacta highlight the value of data within the Department of Defense. 
]]></description>
      <pubDate>Tue, 6 Apr 2021 19:12:26 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Booz Allen Hamilton, Trifacta, Databricks, Carahsoft, Collibra)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/discover-understand-decide-how-dod-is-driving-decisions-from-data-wWWFecVi</link>
      <enclosure length="47425829" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/f20036c9-39d7-4580-ba22-f8b0b64e94db/audio/ce4dd5c7-d889-4e96-b604-93ef0e7c66ad/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Discover-Understand-Decide: How DOD is Driving Decisions From Data</itunes:title>
      <itunes:author>Booz Allen Hamilton, Trifacta, Databricks, Carahsoft, Collibra</itunes:author>
      <itunes:duration>00:49:21</itunes:duration>
      <itunes:summary>In this podcast, a panel consisting of Allyson Spring, the AVP for Federal at Collibra, Graham Evans, Principal at Booz Allen Hamilton, Howard Levenson, the General Manager for Federal at Databricks, and Brian Shealey, the VP of Public Sector at Trifacta highlight the value of data within the Department of Defense.</itunes:summary>
      <itunes:subtitle>In this podcast, a panel consisting of Allyson Spring, the AVP for Federal at Collibra, Graham Evans, Principal at Booz Allen Hamilton, Howard Levenson, the General Manager for Federal at Databricks, and Brian Shealey, the VP of Public Sector at Trifacta highlight the value of data within the Department of Defense.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">73ee02ab-be79-46e1-9b4d-0ba095ea1f09</guid>
      <title>Data Governance to Help Advance Mission with Collibra</title>
      <description><![CDATA[In this podcast, a panel consisting of Aileen Black, and SVP of Public Sector at Collibra, Nick Hart, the President of Data Foundation, Dr. Barry West, the CEO and Founder of West Wing Advisory Services, and Iram Ali, the Senior Customer Enablement Advisor for US Federal and Non-Profit Businesses at AWS highlight the value of data governance, and how it can help advance mission. 
]]></description>
      <pubDate>Tue, 6 Apr 2021 18:57:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (West Wing Advisory Services, Data Foundation, Collibra, AWS, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-governance-to-help-advance-mission-with-collibra-4LXydJa0</link>
      <enclosure length="46681892" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d3099be3-1982-4188-8658-e88ba9b61e97/audio/12bea989-ff6a-4e33-98d0-390f7b5bc312/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Data Governance to Help Advance Mission with Collibra</itunes:title>
      <itunes:author>West Wing Advisory Services, Data Foundation, Collibra, AWS, Carahsoft</itunes:author>
      <itunes:duration>00:48:36</itunes:duration>
      <itunes:summary>In this podcast, a panel consisting of Aileen Black, and SVP of Public Sector at Collibra, Nick Hart, the President of Data Foundation, Dr. Barry West, the CEO and Founder of West Wing Advisory Services, and Iram Ali, the Senior Customer Enablement Advisor for US Federal and Non-Profit Businesses at AWS highlight the value of data governance, and how it can help advance mission.</itunes:summary>
      <itunes:subtitle>In this podcast, a panel consisting of Aileen Black, and SVP of Public Sector at Collibra, Nick Hart, the President of Data Foundation, Dr. Barry West, the CEO and Founder of West Wing Advisory Services, and Iram Ali, the Senior Customer Enablement Advisor for US Federal and Non-Profit Businesses at AWS highlight the value of data governance, and how it can help advance mission.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">62c74a63-8e36-4810-b000-0f22d174d15a</guid>
      <title>Strengthening the Mission with Identity-Centric Security</title>
      <description><![CDATA[In this podcast, Frank Briguglio, Global Public Sector Strategist at SailPoint Technologies, Wes Dunnington, Senior Director or Architecture at Ping Identity, Wade Ellery, Director of Solution Architects and Senior Technical Evangelist at Radiant Logic, Rashaad Steward, Systems Engineering Director for U.S. Public Sector at Exabeam, and Matt Topper, President and Solutions Architect at UberEther will discuss how to radically enhance security by integrating industry-proven solutions you probably already have. 
]]></description>
      <pubDate>Mon, 5 Apr 2021 16:11:53 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Radiant Logic, UberEther, Carahsoft, Ping Identity, Exabeam, Sailpont Technologies)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/strengthening-the-mission-with-identity-centric-security-yJf2MBv7</link>
      <enclosure length="50989927" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/10db1644-25de-4e2c-a1b0-3b3d1893237f/audio/3739733e-e942-4d8a-a300-2fdc0258ec8a/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Strengthening the Mission with Identity-Centric Security</itunes:title>
      <itunes:author>Radiant Logic, UberEther, Carahsoft, Ping Identity, Exabeam, Sailpont Technologies</itunes:author>
      <itunes:duration>00:53:05</itunes:duration>
      <itunes:summary>In this podcast, Frank Briguglio, Global Public Sector Strategist at SailPoint Technologies, Wes Dunnington, Senior Director or Architecture at Ping Identity, Wade Ellery, Director of Solution Architects and Senior Technical Evangelist at Radiant Logic, Rashaad Steward, Systems Engineering Director for U.S. Public Sector at Exabeam, and Matt Topper, President and Solutions Architect at UberEther will discuss how to radically enhance security by integrating industry-proven solutions you probably already have.</itunes:summary>
      <itunes:subtitle>In this podcast, Frank Briguglio, Global Public Sector Strategist at SailPoint Technologies, Wes Dunnington, Senior Director or Architecture at Ping Identity, Wade Ellery, Director of Solution Architects and Senior Technical Evangelist at Radiant Logic, Rashaad Steward, Systems Engineering Director for U.S. Public Sector at Exabeam, and Matt Topper, President and Solutions Architect at UberEther will discuss how to radically enhance security by integrating industry-proven solutions you probably already have.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ee019909-74de-4d65-8420-a9c0cb9cb461</guid>
      <title>Ensuring Compliance and Security for K-12 Home Internet Access</title>
      <description><![CDATA[In this podcast, experts from Zscaler & Garnet River discussed how K-12 organizations can provide a secure and seamless transition for their Home Internet Access for Students that includes remote learning, as well as, ensuring compliance through simple Internet safety, privacy and security policy implementation. As the Internet is utilized more and more, deeper protection is required to keep students, teachers, principals, and administrators safe without compromising the educational processes. 
]]></description>
      <pubDate>Fri, 2 Apr 2021 13:53:21 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Garnet River, Zscaler)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/ensuring-compliance-and-security-for-k-12-home-internet-access-PowLO4qi</link>
      <enclosure length="33952801" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/872ea68b-d29e-45a4-b055-9fdb4e546fad/audio/0a542ac1-febb-4838-ace2-154257aecf34/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Ensuring Compliance and Security for K-12 Home Internet Access</itunes:title>
      <itunes:author>Carahsoft, Garnet River, Zscaler</itunes:author>
      <itunes:duration>00:35:19</itunes:duration>
      <itunes:summary>In this podcast, experts from Zscaler &amp; Garnet River discussed how K-12 organizations can provide a secure and seamless transition for their Home Internet Access for Students that includes remote learning, as well as, ensuring compliance through simple Internet safety, privacy and security policy implementation. As the Internet is utilized more and more, deeper protection is required to keep students, teachers, principals, and administrators safe without compromising the educational processes.</itunes:summary>
      <itunes:subtitle>In this podcast, experts from Zscaler &amp; Garnet River discussed how K-12 organizations can provide a secure and seamless transition for their Home Internet Access for Students that includes remote learning, as well as, ensuring compliance through simple Internet safety, privacy and security policy implementation. As the Internet is utilized more and more, deeper protection is required to keep students, teachers, principals, and administrators safe without compromising the educational processes.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3fa9db08-f6ba-4b6f-b03d-708e19d6a761</guid>
      <title>Dive Deeper into Google Cloud Dataprep by Trifacta and How it Accelerates Analytics</title>
      <description><![CDATA[In this podcast, Eric Clark, Program Manager at SpringML, and Brian Shealey, Vice President of Public Sector at Trifacta, discuss how the service is used across many of its clients and how you can use Cloud Dataprep in your own organization. 
]]></description>
      <pubDate>Mon, 29 Mar 2021 14:52:35 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (SpringML, Google Cloud, Trifacta, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/dive-deeper-into-google-cloud-dataprep-by-trifacta-and-how-it-accelerates-analytics-Yc6TE98K</link>
      <enclosure length="26006836" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6de7137c-a926-40fa-a71b-bff14cdbd6e8/audio/1b865d59-4888-4b81-a026-5f0fb936976e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Dive Deeper into Google Cloud Dataprep by Trifacta and How it Accelerates Analytics</itunes:title>
      <itunes:author>SpringML, Google Cloud, Trifacta, Carahsoft</itunes:author>
      <itunes:duration>00:27:03</itunes:duration>
      <itunes:summary>In this podcast, Eric Clark, Program Manager at SpringML, and Brian Shealey, Vice President of Public Sector at Trifacta, discuss how the service is used across many of its clients and how you can use Cloud Dataprep in your own organization.</itunes:summary>
      <itunes:subtitle>In this podcast, Eric Clark, Program Manager at SpringML, and Brian Shealey, Vice President of Public Sector at Trifacta, discuss how the service is used across many of its clients and how you can use Cloud Dataprep in your own organization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dff602cf-9b14-4125-8859-99ee6428b920</guid>
      <title>How Airports Can Diversify with Digital Transformation</title>
      <description><![CDATA[U.S. air travel has been forever changed by COVID-19. When post-pandemic travel ramps up, airports will be seeking to recover lost revenue while modernizing processes to deliver touchless experiences to travelers. So what can airports do to seamlessly adjust to this new normal and reinvent traditionally siloed operational models to meet constituent expectations?
In this podcast, our panel of experts from Adobe, AOE, AWS, and Auckland Airport discuss how U.S. airports can rapidly convert legacy processes, personalize experiences and communications based on data, and deliver improved non-aeronautical revenue.
Listen to this podcast to hear:
•	Current trends and recommendations to drive non-aeronautical revenue
•	Why distinctive, diverse, and digital experiences are imperative for airports to leverage
•	How airports can quickly move from offline to online, increase internal collaboration, and empower citizens and employees with digital transformation solutions
•	Auckland, Frankfurt, and London Heathrow airports’ modernization initiatives and lessons learned
 
]]></description>
      <pubDate>Thu, 25 Mar 2021 15:32:15 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AOE, AWS, Auckland Airport, Carahsoft, Adobe)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-airports-can-diversify-with-digital-transformation-l8ScMVwG</link>
      <enclosure length="46084679" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7c41e4c0-c085-4b75-8e68-99020ba095d4/audio/44c340e9-6e7a-4a1b-b828-78969a6355ee/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How Airports Can Diversify with Digital Transformation</itunes:title>
      <itunes:author>AOE, AWS, Auckland Airport, Carahsoft, Adobe</itunes:author>
      <itunes:duration>00:48:00</itunes:duration>
      <itunes:summary>U.S. air travel has been forever changed by COVID-19. When post-pandemic travel ramps up, airports will be seeking to recover lost revenue while modernizing processes to deliver touchless experiences to travelers. So what can airports do to seamlessly adjust to this new normal and reinvent traditionally siloed operational models to meet constituent expectations?
In this podcast, our panel of experts from Adobe, AOE, AWS, and Auckland Airport discuss how U.S. airports can rapidly convert legacy processes, personalize experiences and communications based on data, and deliver improved non-aeronautical revenue.
Listen to this podcast to hear:
•	Current trends and recommendations to drive non-aeronautical revenue
•	Why distinctive, diverse, and digital experiences are imperative for airports to leverage
•	How airports can quickly move from offline to online, increase internal collaboration, and empower citizens and employees with digital transformation solutions
•	Auckland, Frankfurt, and London Heathrow airports’ modernization initiatives and lessons learned
</itunes:summary>
      <itunes:subtitle>U.S. air travel has been forever changed by COVID-19. When post-pandemic travel ramps up, airports will be seeking to recover lost revenue while modernizing processes to deliver touchless experiences to travelers. So what can airports do to seamlessly adjust to this new normal and reinvent traditionally siloed operational models to meet constituent expectations?
In this podcast, our panel of experts from Adobe, AOE, AWS, and Auckland Airport discuss how U.S. airports can rapidly convert legacy processes, personalize experiences and communications based on data, and deliver improved non-aeronautical revenue.
Listen to this podcast to hear:
•	Current trends and recommendations to drive non-aeronautical revenue
•	Why distinctive, diverse, and digital experiences are imperative for airports to leverage
•	How airports can quickly move from offline to online, increase internal collaboration, and empower citizens and employees with digital transformation solutions
•	Auckland, Frankfurt, and London Heathrow airports’ modernization initiatives and lessons learned
</itunes:subtitle>
      <itunes:keywords>airport digital transformation, diversify</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ff5c585e-47e8-4338-9dee-c3b118418386</guid>
      <title>Build, Deliver and Improve Applications Faster Using AWS</title>
      <description><![CDATA[In this podcast, you’ll take back key action items to your team to accelerate the process of building, launching, and automating secure applications on AWS. 
]]></description>
      <pubDate>Mon, 15 Mar 2021 18:32:02 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, AWS)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/build-deliver-and-improve-applications-faster-using-aws-Ay1xBDYo</link>
      <enclosure length="38103158" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/07b0f302-3d75-407d-baa9-53bae355e561/audio/ba53c474-b198-40d6-9316-8471a50e7644/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Build, Deliver and Improve Applications Faster Using AWS</itunes:title>
      <itunes:author>Carahsoft, AWS</itunes:author>
      <itunes:duration>00:39:39</itunes:duration>
      <itunes:summary>In this podcast, you’ll take back key action items to your team to accelerate the process of building, launching, and automating secure applications on AWS.</itunes:summary>
      <itunes:subtitle>In this podcast, you’ll take back key action items to your team to accelerate the process of building, launching, and automating secure applications on AWS.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">89bc4326-329a-48a0-9a1b-91650e901032</guid>
      <title>F5 Zero Trust Panel Discussion</title>
      <description><![CDATA[<p>On behalf of F5 and Carahsoft, we would like to welcome you to today's podcast, focused around zero trust, where Scott Rose, computer scientist at NIST and a co-author on NIST's 800-207, Zero Trust Architecture publication; Gerald Caron, Director of Enterprise Network Management for the Department of State; Brandon Iske, Chief Engineer at DISA; and Jason Wilburn, zero trust engineer at F5, will discuss the pros and cons of different zero trust designs, how other federal initiatives tie into zero trust, and understanding what zero trust principles do for cybersecurity posture.</p><p> </p><p><strong>Ryan Johnson: </strong>Thank you. Once again thanks, everyone, for joining. My name is Ryan Johnson. I'm a solutions engineering manager with F5 Government Solutions. Today, we have a group of exciting guests, mostly from the federal space, to discuss zero trust in theory and talk about the implementation of zero trust. First off, I have Scott Rose with NIST. Scott, would you like to talk a little bit about yourself?</p><p><strong>Scott Rose:</strong> Sure, thanks. I'm Scott Rose. I am currently at the Information Technology Lab at NIST. I am the coauthor of the NIST special publication 800-207, Zero Trust Architecture, and also, attached as a subject matter expert for the upcoming NCCOE, or National Cybersecurity Center of Excellence Project on Zero Trust Architecture.</p><p><strong>Ryan Johnson:</strong> Thank you, Scott. If anyone hasn't had a chance to read that 800-207, definitely take a look. It's well worth your time. Next off, we have Gerald Caron who's with HHS. Gerald, would you like to tell us a little about yourself?</p><p><strong>Gerald Caron: </strong>Well, I'm on detail to HHS, but technically I am the representative of the Department of State, then SES. I'm the director for Enterprise Network Management at the Department of State. Basically, the infrastructure person, do the network, active directory, a lot of the security implementation aspects of things. I am participating and starting to co-chair the CIO's innnovation council working group on zero trust. I am Forrester certified and zero trust strategist as well.</p><p><strong>Ryan Johnson: </strong>Very good. Thank you, Gerald. Next up, we have Jason Wilburn with F5 Networks. He's identity and access guru or [inaudible 00:02:20], if you will. Jason, would you like to tell us a little bit about yourself?</p><p><strong>Jason Wilburn: </strong>Sure. Thanks, Ryan. So, I'm a system engineer, covering the system integrator space for F5 Federal. But as Ryan mentioned, I am also the co-lead for [inaudible 00:02:35], which is anything related to access and authorization controls or access policy manager product.</p><p><strong>Ryan Johnson:</strong> Thank you, Jason. Next up, we have Brandon Iske with DISA. Brandon, would you like to tell us a little bit about yourself.</p><p><strong>Brandon Iske: </strong>Yes, thank you, Ryan. So, I'm Brandon Iske. I'm the Chief Engineer for our Security Enablers Portfolio. So, that includes ICAM or Identity and Credential Access Management, Zero Trust reference architecture development, Public Key Infrastructure, PKI, and then Software Defined Enterprise. So, I'm part of the Defense Information Systems Agency. Again, it's a [inaudible 00:03:12] support agency to the Department of Defense. Thank you.</p><p><strong>Ryan Johnson: </strong>Well, thank you, Brandon. There are two topic we're going to talk about. The first is behind the theory Zero Trust, understanding federal zero trust straight from the source. The second topic is the reality, the implementation of zero trust. So, jumping into the first topic, the theory. This question to you, Scott Rose. You're one of the authors of NIST 800-207 Zero Trust Architecture. Can you tell us briefly what problem zero trust is trying to solve, and what are the main goals?</p><p><strong>Scott Rose:</strong> Well, yeah, zero trust is the new paradigm of how you want to look at enterprise security. Basically it's taking a lot of the trends that we saw emerging over the last 10 years or so and pulling them together and layering them together to solve what we see is like company attacks that the common script from attacks that you see are going out there. It's where the initial breach happens. The attacker then moves laterally through the network, and then performs the actual attack ransomware, data exfil, whatever. Then they're not discovered until the next audit, some six, eight months later.</p><p>Zero trust tries to minimize that kind of attack scenario where you segment away, you micro segment away resources, you do endpoint security, you do strong authentication both inside the infrastructure, on-prem as well as outside coming in to limit that lateral movement and make sure that every connection from a client to an enterprise and resource is both authenticated and authorized. The ideas that you want to try, don't rely on your perimeter defenses anymore, but you're doing it every step of the way. So, there's a little mini perimeter around like now, every resource and every user. So, you always have, at least, more knowledge, not total knowledge, of what's going on in your enterprise.</p><p><strong>Ryan Johnson:</strong> Thank you Scott. This next question is for you, Gerald. What is the biggest misconception about zero trust?</p><p><strong>Gerald Caron:</strong> First of all, the level setting on the definition that I find is most difficult and people really understanding. No offense to any of the vendors here, but depending on who you talk to, they spend the definition their own way. So getting that common understanding of what zero trust is, is really important. Some people think its identity, but it's a little more than that. As Scott was saying, it's about protecting what's important and shifting that paradigm in that culture that we do. We're very compliance-focused culture. FISMA makes us that way, put our scorecards, things like that.</p><p>But I think zero trust gets us to a more effective cybersecurity posture. Commonly, we've done that peanut butter spread approach, where we try to protect everything equally, with Frederick the Great says, "If you try to protect everything equally, you protect nothing." That quote up, basically, but great IT innovator that he was. But really that peanut butter spread approach is not sustainable. You can't cover everything you can't 100 be and 100% patched when you have 109,000 workstations across the world. It's pretty unlikely.</p><p>So what's important, as Scott was talking about? What's important? Definitely, if you need to understand what zero trust is. You're grappling with that definition. Yes, definitely. Don't suggest, but do read 800-207. I believe, and Scott would agree with me that, that's going to morph as new technologies and capabilities and concepts come about, that that is going to morph and mature as we go along on this journey as well.</p><p><strong>Ryan Johnson:</strong> Yeah, I would agree with you on that. This next question's to Brandon. Looking ahead, what are the next or the biggest stumbling blocks for creating a zero trust environment?</p><p><strong>Brandon Iske:</strong> Thank you for that question. So from my perspective, I think within DISA and DoD again, we're a very large environment. So I think from our vantage point, just trying to set the standards is really what where we're at. So again, we very much leverage the 800-207 as a framework for DoD and what we develop for the zero trust reference architecture. So, we've recently approved that. So that's available internal to the DoD right now. So that's our way to get the common framework, and language, and taxonomy established across the department.</p><p>Other trends, we see, again a lot of the pillars of zero trust really do rely on existing capabilities and cybersecurity efforts that we have. From my vantage point, I think there are a few gaps in those technologies, at least, for what the department has adopted from an enterprise perspective. So, I'll talk on some of those. Again, it's making sure we're doing the existing capabilities, whether it's ICAM, whether it's endpoint, whether it's network segmentation. All those things really have to start coming together. Again, it's eliminating those stove pipes and enabling more API access to these capabilities, tighter integration, and really trying to drive towards conditional access beyond just what we do with PKI, CAC, or PIV today.</p><p>The one gap I see the department has been looking at pretty heavily across the board is as how do we access our IL5 cloud environments from commercial internet. Really with COVID and mass telework, that's been a big challenge for us is to enable secure, collaboration, and access to applications and data, but still from most of us being off the network. So, for [inaudible 00:09:07] that's a big challenge because, in those cases, a lot of our designs assume all the users are on inside the perimeter. So, this concept really changes that or turns the problem on its head. So again, that's secure access.</p><p>We're also looking at some of the SASE-type capabilities or secure access edge capabilities. But even in that space, the duty is large. We're not going to be able to just use one vendor across the board. So, trying to drive interoperability of those capabilities, looking at what's best of breed, but also how can we... I don't want to have 10 agents on my computer just to be able to get to different applications across the department. So those are some of the big challenge I think we still see us ahead beyond just the obvious cultural challenges of getting everyone to understand the concept, build their maturity model towards that, and then adopt these concepts and integrations.</p><p><strong>Ryan Johnson: </strong>Yeah. I would definitely agree with you. This is not a single vendor solution by any means. This will be a grouping of different vendors to maybe some homegrown stuff to address these type of issues. Thank you, Brandon. Next question is to Jason Wilburn. Zero trust makes identity to the new perimeter. Why does zero trust take this approach?</p><p><strong>Jason Wilburn:</strong> So, one of the things that I always laugh when I hear that it's the new perimeter because I've heard that it's the new perimeter for 10 years. I think I even have it coined from F5 from eight years ago, they said identity is the new perimeter. So I guess my wife's car that's 10 years old is still new to her. So, the fact is, is identity, really, is a linchpin in a zero trust infrastructure because without identity, you can't really secure anything because we have to know who that person is or what is making that request. That becomes really important in a couple of things.</p><p>One is the account creation. Are we creating accounts? Where do those accounts live, and how many entities of that identity actually just wrote an organization because the identity of John Smith can exist in multiple places? Really, what we're trying to do is to reduce the number of identities down to really holistically one single identity for, say, John Smith. But also, the next piece and that is really getting down to how they authenticate or how they assert themselves inside of the environment. That really gets down to things like multifactor neighbor, or if we can really get to the holy grail of going full password, which in the federal space we do a lot of password list-based authentication, doing things like smart cars, CAF, PIV, things like that.</p><p>That's really what we're trying to do is truly validate that that user is who they really are because to truly achieve zero trust, a lot of things revolve around one knowing who that user is and then once that user starts doing things within the network, really, should he be able to do those things in this network based off the permission levels and their user behavior and the device they're coming from, and where they're going to, but it all really revolves around the first step, and that user... they're truly identifying who that user is.</p><p><strong>Ryan Johnson:</strong> Yeah. That ties into what everyone else has said, as well Jason. Appreciate that. The-</p><p><strong>Gerald Caron:</strong> Ryan, can I add something to that question?</p><p><strong>Ryan Johnson:</strong> Absolutely.</p><p><strong>Gerald Caron:</strong> That identity of the new perimeter thing really scares me because then people get super focused on identity and say [inaudible 00:12:57] zero trust. That's just a, for lack of a better term, a pillar. Everything Jason said is absolutely important. But if Jason's account got compromised, for instance, what's the first two questions probably the cyber guy is going to ask that's looking at the problem? What did he have access to, and is there [inaudible 00:13:16]?</p><p>So it actually becomes about the data more than anything. So, it's about protecting that data at the end of the day. So I think it's really important. I think one of the things that, really, an identity itself is we do it very linear today, where it's one-time authentication, it's one-time access and then. Okay. Have a nice day. It's got to be a constant dynamic checking and rechecking of many other factors, as well as authentication and access. It's going to be continuous.</p><p><strong>Jason Wilburn:</strong> Yeah. You're completely right, Gerald. Identity really is just one more data point to determine access to something, right?</p><p><strong>Gerald Caron:</strong> Yeah, I totally agree. I just like to clarify that that's just one piece of it. [crosstalk 00:14:01].</p><p><strong>Ryan Johnson:</strong> Not the entire enchilada, if you will.</p><p><strong>Gerald Caron:</strong> Correct because I see a lot of people talk about it that way.</p><p><strong>Jason Wilburn:</strong> No, no.</p><p><strong>Ryan Johnson:</strong> Yeah, I would agree with you on that because a lot of places aren't doing that currently, and they think this is the solution, but it's just, like you said, part of the solution.</p><p><strong>Jason Wilburn: </strong>Right. The enforcement point, like to take back to Scott's document, with the 207, the enforcement point's right, they will know about the identity, but the enforcement point takes in a lot more consideration beyond just the user's identity. There's all that telemetry data that we're getting in. What's the machines coming from? What they're trying to access? There's lots more information than just the user identity to determine access control.</p><p><strong>Gerald Caron: </strong>Right. It's not always a human, right.</p><p><strong>Jason Wilburn:</strong> That's right.</p><p><strong>Gerald Caron: </strong>There's data flowing all the time and then there's data at rest. So, you got to protect that. There's not always the human involved.</p><p><strong>Jason Wilburn: </strong>Completely right. So let's go down the road of what do we do with the service account that's coming from and making an API call from one PC to another PC in the same data center. How do you validate that and secure that beyond really when I think... a lot of times when we talk about zero trust, a lot of times we talk about remote users or just users in general, talking to resources and what we've been trying to get away from [inaudible 00:15:24] the user doesn't really matter where they live, whether they live in corporate environment or whether they live at home, or they're in Starbucks, where the user live resides doesn't really matter because at a network level, that's just an IP address.</p><p>We care about, one, how did they authenticate; and two, what device are they trying to access from, not just... is he on the corporate... The corporate land might give us more information and more telemetry by just being on the WiFi at Starbucks, but it's more than identity definitely.</p><p><strong>Ryan Johnson: </strong>One thing that really hits home for me is the proliferation of modern applications, and API's talking everything. You got APIs on the cloud or even within the same agency or interagency or app, however, and Gerald's point about these non-human interactions verifying those, especially, when it's so spread out with different APIs. To me that really hits home. The next question is to Scott. There are multiple architectures listed in the 800-207. Why would an organization choose one architecture over another?</p><p><strong>Scott Rose: </strong>Basically, as they need to look at whatever they're trying to push a zero trust architecture on, what workflow, what mission they're doing, all that will help decide which model will fit best for them. You got to take into account, both what they may already have owned or what technology needs they have, what can they just... what they can use anyway, just configure in a different way. Let's say they already went with vendor A and they have an installed base, but there are certain features that they're not using now, but as they move towards a zero trust architecture, they just turn those on because some things work better than others, some solutions require like agents installed, may not be able to put agents on things, especially if you're looking at [inaudible 00:17:28] an IoT kind of deployment. You can't push a lot of agents on the small form devices, but you have to go with a different model there.</p><p>But when it comes to the approaches that we described, like the enhanced identity governance, microsegmentation, software-defined perimeters, I think of the most mature as zero trust enterprises and architectures out there will have elements of all three. Those three approaches, we're just calling those like what is the load bearing technology that you're using in your architecture, whereas the models are more of what kind of products are you using, that dictates the model. Whereas like what technology are you putting the emphasis on, whether you're the identity management governance part, the micro segmentation parts, or using a software-defined networking or software-defined perimeter model. All those depends what's you're doing in that initial analysis, both what is the mission or workflow that you're working on to try and make more secure, and then you develop the other set of policies and controls around those, and then those guide you as to which model that you may be going towards.</p><p><strong>Ryan Johnson: </strong>Thank you, Scott. Appreciate that. Next question is to Gerald. Looking into the future, what's next in zero trust? What technologies are going to impact zero trust security or require security in a different way than we see right now?</p><p><strong>Gerald Caron: </strong>Technology moves so fast nowadays, you can't keep up. As I'm speaking right now something new, something new just come out that I don't know about. But Brandon, I think, mentioned SASE and edge computing. I think that's something that people are very much looking at services through the cloud. One of the things I advocate for that I'm looking at is I hate being tethered to an on-premise network. We're in a new normal. Everybody's working mobily now. I have to Boomerang back just to go back out to the cloud on the internet. So, how can I be untethered but to have all the security that I need in telemetry to make the right decisions is something that I'm looking at. So, it's something that I advocate for as well.</p><p>So, technology is moving so fast. I think some are a little more mature than others in this space. But I see it's going to be very much competitive because we're all looking this way now. I think, as I said before, we're all trying to become more effective at our cybersecurity, not just check marks and coming compliant. We really need to protect the data and then the things that we need to protect. I equate I get to protect the crown jewels versus the bologna sandwich. You can have my bologna sandwich. But I'm going to put my concentration on those crown jewels.</p><p>So understanding what's important to you and understanding what the heck is your risk posture. A lot of people struggle with accepting and understanding what their risk is. There is a lot of non-technical aspects to zero trust that people need to understand, the methodologies, what is your risk tolerance and the processes, and what is the data, and where is your data, and what is that categorization of that data. Those are all non-technical things. There's a lot of work in those areas that people do struggle with that I find. So, there's a lot. But I see every day talking with a lot of vendors, there's a lot of maturity in the space, and I just look forward to seeing some of the capabilities because there's a lot of concepts in 800-207, like I talked about ongoing authentication and ongoing access.</p><p>Right now, it's very linear still. That's something that would be maturing that people are looking at doing so. I think there's a lot. I look forward to it because a lot of people are putting their emphasis here, especially, with what we just experienced with the solar winds. There's a lot of focus in this area now, even more so if there wasn't before.</p><p><strong>Brandon Iske: </strong>Ryan, if I can add in there, I think, Gerald is spot on. I think, as we can build towards more dynamic access, conditional access, and then having applications be aware of that context to govern what I can and can't do what's on that application. I think that's where... As all this comes together, those are the type of outcomes that we start to get at, whether if I'm from a personal device and maybe a low-assurance model, maybe I can't download attachments or something, but I can view those or view some content. So, those additional granular controls, I think, start to come out there, become achievable once we have some of these capabilities, conditional access and aggregation of telemetry together as well.</p><p><strong>Jason Wilburn: </strong>If I can jump in, too, Ryan. I think that just being able to absorb the additional telemetry data, whether it be some sort of behavioral analytics coming out of a risk engine, just coming out of various security tools, I thought had mentioned this before, the breaking down of the silos between the team. I think that's one of the biggest things about zero trust. Holistically, from a security model perspective, what we're saying is that, hey, it all needs to work together as a single point of control that is closest to the resource, that Gerald mentioned. There can be some context around it that no longer is it just the firewall blocking IPEs and things like that, and DLP looking at data exfil, and antivirus looking at what's happening on the server from a virus perspective or malware happening on the client. It all needs to work together, and it all needs to come back because that becomes part of the behavior or of the workflow that's happening between the client and the resources for accessing so that we can truly understand, is this a permitted flow? Yeah, this is a permitted user coming from a permitted device to a resource that it should have allowed to.</p><p>But based off not just what happened at the very beginning of the session, but what's happening throughout the life of the session, what's changed throughout the life of the session, that becomes critically important to really secure everything day one because back to Gerald's data exfil comment. Cool. You've got access to the data right now. Should you be able to download some document or upload some document five minutes into the session based off what something has changed? Maybe not.</p><p><strong>Ryan Johnson: </strong>Yeah, I agree that's what we're trying to get to. All right. That concludes the first topic of the theory. Now, we're going to jump into the second topic, the reality, adopting zero trust. The first question is once again to Scott Rose. What components are available to federal entities to assist in forming zero trust architecture?</p><p><strong>Scott Rose: </strong>Well, most of these are not real solid technologies, but it's more of frameworks and things that may help. There are existing government programs already out there. Both like a DHS, they have their CDM program. There's FICAM, things like that. These are already in place to actually build these, kind of like what Gerald called the pillars of zero trust. They've already been in place for a while. We looked at how zero trust extends those, how those reliant on those programs.</p><p>I mean, as well as we have for NIST, there's the risk management framework. That isn't the end all be all, but you can think of that as a tool to help one level down. Once you've developed that architecture, the RMF can maybe help develop that set of controls and checks in place to actually ensure that what you're doing, you're implementing correctly to your stated goals. These things are in place that are basically technology neutral, that whatever vendors you're using, you can always apply these frameworks and tools to help along the way.</p><p>In a way, that NIST, the Special Publication 800-207, that's also... think of that as a framework, [inaudible 00:25:53] just both on the architects, but also the way that the architects can then talk to the procurement people. They can, hopefully, understand what exactly you want. So when the procurement and the architects talk to the vendors, they're all speaking that same set of term, not just [inaudible 00:26:09] randomly zero trust or something like that. There's actually a set of rules and uses for these technologies that they can both use as a common set of terms.</p><p><strong>Ryan Johnson: </strong>All right, next question... Thanks again for that, Scott. Next question is for Gerald. What are the things that enterprise needs to understand before migrating to ZTA or zero trust architecture?</p><p><strong>Gerald Caron: </strong>That's a really good question. Think of the difficulty that some folks are going to have. I mentioned the data, understanding the data, where it is, where it's going and what classification it is. The where it's going. Where is it normally go? What is the flow? What is normal look like? How do you baseline normal? That's going to be really difficult because understanding what normal looks like will depend on when something happens now, what actions do I have to take? So understanding where that data flow is, where that data resides, what it is, who owns it because you're going to have to work with data owners. It's going to take a village. It's not just the network guys, not just the IT guys. It's going to take a village to do with zero trust in my estimate at an agency.</p><p>But, as Scott was saying, be on the same page with terminology and things like that. But I think that's the difficult part. I think that answers one of the questions is how do you know what abnormal is? Well, you got to know what normal looks like to know what abnormal looks like. So I think that's really important. So, I like the inside out method, that start with the data, and then all right, what's facilitating access to that data. Device app. What do you do with those things, and then work back to the identity, given the right access to the right people at the right time.</p><p>We talked about this from the end user standpoint a lot. I want to go back to this. The administrators as well are very powerful. So you have to address the administrators. I think that gets lost a lot of times when people start talking about... They talk about users accessing data. Well, your administrators need to be addressed as well in a zero trust. So that's something that's difficult.</p><p>The one other thing I would say that's difficult, Ryan, is that we all, as different agencies, we all share data, we all classify it differently. If I want to share with Brandon a certain amount of data, I do sensitive but unclassified, but he may classify it in a different way. Where do we meet when we want to share data with those different classifications, so that we can properly do that? Then when I give Brandon my data, it's my data. He's going to be a good steward for it. If he doesn't have the right things in place, now, I've put my data out there. So, how can we all get on that same page? Interagency sharing is I think going to be a challenge as well.</p><p><strong>Ryan Johnson: </strong>Absolutely. It makes complete sense. That's a big, big challenge. Next question is for Brandon. Is it necessary to have a ZTA if the enterprise does not utilize cloud resources?</p><p><strong>Brandon Iske: </strong>Thank you for that question. I would say absolutely. Again, the threat is the same whether you're in the cloud or not. So, whether you have disconnected resources, or closed networks, or connected networks. You still have very similar threats to some extent. So I think it absolutely applies. Again whether you look across the pillars, whether it's identity or endpoint, we still have to do those same things and even what we're doing in DoD to enhance our identity ICAM processes. Again, it's all about authentication and account lifecycle management. Those are the big pieces that... We still have a long journey to get to from an enterprise perspective to get those under control in a better fashion than what we do today.</p><p>We have CAC or PIV programs that are very strong, but again, those are a strong authenticator. It's the entire lifecycle of the additional pieces of identity that come into play. Again, all those same concepts apply regardless of where the data or applications exist. Other efforts that we've done in this arena as well, too, I would say is our cloud-based internet isolation. So again, this is a way that we move the end user browsing to a cloud environment for our actual benefit. So, in this case, basically, my browsing session is going to be terminated in a cloud environment. From a data protection and exploit perspective, those drive by downloads basically would happen in that cloud environment, not on my endpoint. So, it actually comes to help us also in this mass telework environment as well, too.</p><p>So, I can split my traffic going straight to the cloud for browsing and not backhaul that all the way back to the VPN to come on to the internal network. So, that's given us a few really big benefits, again, in a very hybrid model where in some cases, we're using cloud; in other cases, we still have a huge set of legacy that's still going to be on-prem for the foreseeable future until they modernize or whatever schedule they have to modernize.</p><p><strong>Jason Wilburn: </strong>Brandon, if I could ask a question about the browser isolation component. Is this going to be in when a user is accessing internal resources inside of the agencies, or is this going to be also a service that's internet-facing? So, when a user's setting on-prem or anywhere, and he's now going to the internet once they go to Google, is all internet traffic really going to be browser isolated? Is that the envisioning?</p><p><strong>Brandon Iske: </strong>So, it is what we're doing. So, the basically .com or any commercial internet browsing [inaudible 00:31:55] capability [inaudible 00:31:57] .mil is going to bypass that. So, whether I'm on a VPN or the .mil resources already internet facing, those are the [inaudible 00:32:08]. So I mean, basically, you're not routing either way. So, it does allow us to basically not be backhauling that traffic back onto the doden or [inaudible 00:32:16] for duty terminology, for our internal network.</p><p><strong>Ryan Johnson: </strong>Thank you, Brandon. Next question is to Scott Rose. Looking to the future, what is next in zero trust? What technologies are going to impact it or acquired in a different way than what we see right now? I love the question.</p><p><strong>Scott Rose: </strong>Yeah. I don't know for sure because everybody makes predictions and are constantly surprised about how they don't pan out. But at least in the near term, I see a lot of people focusing both on IoT like we are as well. How do you get those and manage those in an automatic fashion? So, you don't actually have to have human administrators going out and touching all those devices or doing something to those devices. They're getting to the point where you can just quickly get them onboard them onto a network. You know exactly what they're doing because they say what they're doing in [inaudible 00:33:19]. Manufacturer vouches for them. You onboard them, you have go through the entire lifecycle, and you offboard them if you need to all in a more streamlined automated fashion. That's going to be coming on as people look for IoT solutions.</p><p>The other one is we're seeing more people looking at machine learning when it comes to developing user profiles as feedback to what we call like the policy engine or the trust algorithm moving on. Building up again, what does this user normally do in order to see when something abnormal happens? You always [inaudible 00:33:57] this. You have a person, say, working in HR, and they connect to this database with all the user information. They do roughly, say, three to five gigs of traffic going back and forth from this database a day. Suddenly, you see that jump up to 800 gigs. That should cause a red flag going up because that's abnormal. But then again, maybe it's because there's the annual performance review, where they're downloading everything and going through everything.</p><p>Maybe that happens every year at a certain time. Then again, you're building up that profile saying, "Okay, we know that does happen at a certain timeframe. So what happens outside of that timeframe, then maybe something strange is going on." Those kind of trends we're seeing, just try and improve the dynamic nature of zero trust. That's kind of the things that are just on the horizon and starting to appear.</p><p><strong>Ryan Johnson: </strong>Thank you, Scott. Next question is for Gerald. What mistakes or what are the biggest misunderstandings with zero trust in the industry or within federal entities right now?</p><p><strong>Gerald Caron: </strong>Definition. Understanding the totality of zero trust, understanding as a full architecture, full framework. People talk about it in bits and pieces. Unfortunately, some vendors will talk about zero trust, but you got to understand the whole landscape of it because they may come in and do the authentication and access management piece, but not do the data segmentation piece, or the app hardening piece, or network mapping for understanding where your data's flowing and things. So, understanding that it's not just a one-product thing. It is truly going to be an integration. It's going to take a whole effort, a whole village to do it.</p><p>So, really understanding and getting level set, and understanding the use cases and understanding what your risk tolerance is, is very important. What are you willing to take risk for? What's important to you? Putting your emphasis on what's important. The cafeteria schedule, okay. But your medical records, I'm going to put a little more emphasis on that probably than the cafeteria schedule. So, and understanding where does that reside? How do I protect that and things? So, really understanding what it is you're trying to accomplish, and then we all have our little special snowflakes in all of our different agencies. So, what is our little spin on things? So understanding what your use cases are, I think's really important.</p><p><strong>Ryan Johnson: </strong>Thank you, Gerald. Next question is for Jason. Let's go to another identity question, Jason. If identity is a new perimeter, what should federal agency entities consider when looking at making identity their enforcement point? How is this achieved?</p><p><strong>Jason Wilburn: </strong>So, it's not going to be the enforcement point. It's just going to be another piece of information, a data point that can be used by an enforcement point. To Gerald's point, it needs to be looked at holistically. Identity just needs to be one part of it. I think the biggest thing is understanding really where are all your identities within an organization. Are they all in active directory? Are they all in a SaaS-based [inaudible 00:37:22]? Do each application have their own directory structure? So, while you think that John Smith's account only exists in say active directory, it might exist in multiple locations. So then you need a good strategy to onboard identity, decommission identity, and then also validate identity. That means back into needing some sort of MFA or a good authentication method.</p><p><strong>Ryan Johnson: </strong>Next question is to Scott. What are the concerns a federal entity needs to understand before migrating to ZTA?</p><p><strong>Scott Rose: </strong>Well, the concerns I need to think or that they need to worry about is, basically, they need to know what they do, they need to know their mission, they need to know the risks inherent to that they're doing their mission, and then they need to know what they have, who both.... These are accounts of the network, the devices, the workflows, they need to have those knowledge at first. They need to be able to detect and monitor things previously before they can actually start moving down this road to zero trust because you can't really build a policy and a set of checks around things that you don't actually know. So, those are the main concerns.</p><p>Other concerns are how it will impact the users. We need to educate them to make sure everybody else is onboard because if the other kind of operating units in an organization or a federal agency or something, if they're not onboard, there's going to be a problem because the way things are... because they may result in the changes of the workflow of [inaudible 00:39:02] times. They're accessing things. What permissions they have or don't have? There's always that learning curve when you're trying to actually refine these policies. If that becomes aggravating, they're going to start trying to find ways around it. That's the last thing you want because then you have the shadow IT springing up behind it and things that you've sorted all these strange traffic that you're not seeing on the network, but people claim that it's very important for them to do their job. Those sorts of things. So you need to actually realize that going down the road of zero trust is a unified front. Everybody needs to take those steps together.</p><p><strong>Ryan Johnson: </strong>Yeah. Thank you, Scott. Probably the last question here, this is directed to Gerald once again. How does zero trust relate to TIC 3.0 and CDM?</p><p><strong>Gerald Caron: </strong>So, I think the great thing about CDM, for those that have been participating in it, it's such a good foundational things that I think you can build on for zero trust. I think Brandon said it, well, earlier, is like, you're probably already doing some things and taking a good inventory of some of those efforts that you already have going on, and how it fits into the zero trust architecture that... So, there may be some tweaks. TIC, I think, definitely is part of... a contributor to the solution, especially, some of these efforts that allow for the telemetry and the services to do that untethering that I was talking about, and get all that data and make decisions based off that.</p><p>Definitely. I think the way CDM is taking in and doing like the asset discovery, a lot of the understanding of the mapping, eventually in the subsequent phases later on to do the network access control, so you can quarantine or trigger an action on a device. There's a lot of good things that I think they provide some good building blocks that will get you a part of your zero trust solution. Not the totality. Of course, we've already talked about that, but I think there's some good foundational pieces that they've put in place that contribute to the overall zero trust architecture.</p><p><strong>Scott Rose:</strong> Yeah. To follow up on that, if you go through the part of the NIST 800-207, we have a coauthor from DHS, and he's the head of the TIC program. We made sure that, at least, the text that we had in those sections where we talk about CDM and TIC, we had a lot of input and overview from DHS there. So, he made sure that the wordings and both of the tone and both matchly don't contradict. So yeah, we made sure that we were expressing the fact that these programs are interlaced.</p><p> </p><p>Thanks for listening. If you would like more information on how Carahsoft or F5 can assist your federal agency, please visit www.carahsoft.com or email us at <a href="mailto:f5-sales@carahsoft.com">f5-sales@carahsoft.com</a>. Thanks again for listening, and have a great day.</p><p> </p>
]]></description>
      <pubDate>Fri, 12 Mar 2021 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, F5)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/f5-zero-trust-panel-discussion-5JN5A7Xc</link>
      <content:encoded><![CDATA[<p>On behalf of F5 and Carahsoft, we would like to welcome you to today's podcast, focused around zero trust, where Scott Rose, computer scientist at NIST and a co-author on NIST's 800-207, Zero Trust Architecture publication; Gerald Caron, Director of Enterprise Network Management for the Department of State; Brandon Iske, Chief Engineer at DISA; and Jason Wilburn, zero trust engineer at F5, will discuss the pros and cons of different zero trust designs, how other federal initiatives tie into zero trust, and understanding what zero trust principles do for cybersecurity posture.</p><p> </p><p><strong>Ryan Johnson: </strong>Thank you. Once again thanks, everyone, for joining. My name is Ryan Johnson. I'm a solutions engineering manager with F5 Government Solutions. Today, we have a group of exciting guests, mostly from the federal space, to discuss zero trust in theory and talk about the implementation of zero trust. First off, I have Scott Rose with NIST. Scott, would you like to talk a little bit about yourself?</p><p><strong>Scott Rose:</strong> Sure, thanks. I'm Scott Rose. I am currently at the Information Technology Lab at NIST. I am the coauthor of the NIST special publication 800-207, Zero Trust Architecture, and also, attached as a subject matter expert for the upcoming NCCOE, or National Cybersecurity Center of Excellence Project on Zero Trust Architecture.</p><p><strong>Ryan Johnson:</strong> Thank you, Scott. If anyone hasn't had a chance to read that 800-207, definitely take a look. It's well worth your time. Next off, we have Gerald Caron who's with HHS. Gerald, would you like to tell us a little about yourself?</p><p><strong>Gerald Caron: </strong>Well, I'm on detail to HHS, but technically I am the representative of the Department of State, then SES. I'm the director for Enterprise Network Management at the Department of State. Basically, the infrastructure person, do the network, active directory, a lot of the security implementation aspects of things. I am participating and starting to co-chair the CIO's innnovation council working group on zero trust. I am Forrester certified and zero trust strategist as well.</p><p><strong>Ryan Johnson: </strong>Very good. Thank you, Gerald. Next up, we have Jason Wilburn with F5 Networks. He's identity and access guru or [inaudible 00:02:20], if you will. Jason, would you like to tell us a little bit about yourself?</p><p><strong>Jason Wilburn: </strong>Sure. Thanks, Ryan. So, I'm a system engineer, covering the system integrator space for F5 Federal. But as Ryan mentioned, I am also the co-lead for [inaudible 00:02:35], which is anything related to access and authorization controls or access policy manager product.</p><p><strong>Ryan Johnson:</strong> Thank you, Jason. Next up, we have Brandon Iske with DISA. Brandon, would you like to tell us a little bit about yourself.</p><p><strong>Brandon Iske: </strong>Yes, thank you, Ryan. So, I'm Brandon Iske. I'm the Chief Engineer for our Security Enablers Portfolio. So, that includes ICAM or Identity and Credential Access Management, Zero Trust reference architecture development, Public Key Infrastructure, PKI, and then Software Defined Enterprise. So, I'm part of the Defense Information Systems Agency. Again, it's a [inaudible 00:03:12] support agency to the Department of Defense. Thank you.</p><p><strong>Ryan Johnson: </strong>Well, thank you, Brandon. There are two topic we're going to talk about. The first is behind the theory Zero Trust, understanding federal zero trust straight from the source. The second topic is the reality, the implementation of zero trust. So, jumping into the first topic, the theory. This question to you, Scott Rose. You're one of the authors of NIST 800-207 Zero Trust Architecture. Can you tell us briefly what problem zero trust is trying to solve, and what are the main goals?</p><p><strong>Scott Rose:</strong> Well, yeah, zero trust is the new paradigm of how you want to look at enterprise security. Basically it's taking a lot of the trends that we saw emerging over the last 10 years or so and pulling them together and layering them together to solve what we see is like company attacks that the common script from attacks that you see are going out there. It's where the initial breach happens. The attacker then moves laterally through the network, and then performs the actual attack ransomware, data exfil, whatever. Then they're not discovered until the next audit, some six, eight months later.</p><p>Zero trust tries to minimize that kind of attack scenario where you segment away, you micro segment away resources, you do endpoint security, you do strong authentication both inside the infrastructure, on-prem as well as outside coming in to limit that lateral movement and make sure that every connection from a client to an enterprise and resource is both authenticated and authorized. The ideas that you want to try, don't rely on your perimeter defenses anymore, but you're doing it every step of the way. So, there's a little mini perimeter around like now, every resource and every user. So, you always have, at least, more knowledge, not total knowledge, of what's going on in your enterprise.</p><p><strong>Ryan Johnson:</strong> Thank you Scott. This next question is for you, Gerald. What is the biggest misconception about zero trust?</p><p><strong>Gerald Caron:</strong> First of all, the level setting on the definition that I find is most difficult and people really understanding. No offense to any of the vendors here, but depending on who you talk to, they spend the definition their own way. So getting that common understanding of what zero trust is, is really important. Some people think its identity, but it's a little more than that. As Scott was saying, it's about protecting what's important and shifting that paradigm in that culture that we do. We're very compliance-focused culture. FISMA makes us that way, put our scorecards, things like that.</p><p>But I think zero trust gets us to a more effective cybersecurity posture. Commonly, we've done that peanut butter spread approach, where we try to protect everything equally, with Frederick the Great says, "If you try to protect everything equally, you protect nothing." That quote up, basically, but great IT innovator that he was. But really that peanut butter spread approach is not sustainable. You can't cover everything you can't 100 be and 100% patched when you have 109,000 workstations across the world. It's pretty unlikely.</p><p>So what's important, as Scott was talking about? What's important? Definitely, if you need to understand what zero trust is. You're grappling with that definition. Yes, definitely. Don't suggest, but do read 800-207. I believe, and Scott would agree with me that, that's going to morph as new technologies and capabilities and concepts come about, that that is going to morph and mature as we go along on this journey as well.</p><p><strong>Ryan Johnson:</strong> Yeah, I would agree with you on that. This next question's to Brandon. Looking ahead, what are the next or the biggest stumbling blocks for creating a zero trust environment?</p><p><strong>Brandon Iske:</strong> Thank you for that question. So from my perspective, I think within DISA and DoD again, we're a very large environment. So I think from our vantage point, just trying to set the standards is really what where we're at. So again, we very much leverage the 800-207 as a framework for DoD and what we develop for the zero trust reference architecture. So, we've recently approved that. So that's available internal to the DoD right now. So that's our way to get the common framework, and language, and taxonomy established across the department.</p><p>Other trends, we see, again a lot of the pillars of zero trust really do rely on existing capabilities and cybersecurity efforts that we have. From my vantage point, I think there are a few gaps in those technologies, at least, for what the department has adopted from an enterprise perspective. So, I'll talk on some of those. Again, it's making sure we're doing the existing capabilities, whether it's ICAM, whether it's endpoint, whether it's network segmentation. All those things really have to start coming together. Again, it's eliminating those stove pipes and enabling more API access to these capabilities, tighter integration, and really trying to drive towards conditional access beyond just what we do with PKI, CAC, or PIV today.</p><p>The one gap I see the department has been looking at pretty heavily across the board is as how do we access our IL5 cloud environments from commercial internet. Really with COVID and mass telework, that's been a big challenge for us is to enable secure, collaboration, and access to applications and data, but still from most of us being off the network. So, for [inaudible 00:09:07] that's a big challenge because, in those cases, a lot of our designs assume all the users are on inside the perimeter. So, this concept really changes that or turns the problem on its head. So again, that's secure access.</p><p>We're also looking at some of the SASE-type capabilities or secure access edge capabilities. But even in that space, the duty is large. We're not going to be able to just use one vendor across the board. So, trying to drive interoperability of those capabilities, looking at what's best of breed, but also how can we... I don't want to have 10 agents on my computer just to be able to get to different applications across the department. So those are some of the big challenge I think we still see us ahead beyond just the obvious cultural challenges of getting everyone to understand the concept, build their maturity model towards that, and then adopt these concepts and integrations.</p><p><strong>Ryan Johnson: </strong>Yeah. I would definitely agree with you. This is not a single vendor solution by any means. This will be a grouping of different vendors to maybe some homegrown stuff to address these type of issues. Thank you, Brandon. Next question is to Jason Wilburn. Zero trust makes identity to the new perimeter. Why does zero trust take this approach?</p><p><strong>Jason Wilburn:</strong> So, one of the things that I always laugh when I hear that it's the new perimeter because I've heard that it's the new perimeter for 10 years. I think I even have it coined from F5 from eight years ago, they said identity is the new perimeter. So I guess my wife's car that's 10 years old is still new to her. So, the fact is, is identity, really, is a linchpin in a zero trust infrastructure because without identity, you can't really secure anything because we have to know who that person is or what is making that request. That becomes really important in a couple of things.</p><p>One is the account creation. Are we creating accounts? Where do those accounts live, and how many entities of that identity actually just wrote an organization because the identity of John Smith can exist in multiple places? Really, what we're trying to do is to reduce the number of identities down to really holistically one single identity for, say, John Smith. But also, the next piece and that is really getting down to how they authenticate or how they assert themselves inside of the environment. That really gets down to things like multifactor neighbor, or if we can really get to the holy grail of going full password, which in the federal space we do a lot of password list-based authentication, doing things like smart cars, CAF, PIV, things like that.</p><p>That's really what we're trying to do is truly validate that that user is who they really are because to truly achieve zero trust, a lot of things revolve around one knowing who that user is and then once that user starts doing things within the network, really, should he be able to do those things in this network based off the permission levels and their user behavior and the device they're coming from, and where they're going to, but it all really revolves around the first step, and that user... they're truly identifying who that user is.</p><p><strong>Ryan Johnson:</strong> Yeah. That ties into what everyone else has said, as well Jason. Appreciate that. The-</p><p><strong>Gerald Caron:</strong> Ryan, can I add something to that question?</p><p><strong>Ryan Johnson:</strong> Absolutely.</p><p><strong>Gerald Caron:</strong> That identity of the new perimeter thing really scares me because then people get super focused on identity and say [inaudible 00:12:57] zero trust. That's just a, for lack of a better term, a pillar. Everything Jason said is absolutely important. But if Jason's account got compromised, for instance, what's the first two questions probably the cyber guy is going to ask that's looking at the problem? What did he have access to, and is there [inaudible 00:13:16]?</p><p>So it actually becomes about the data more than anything. So, it's about protecting that data at the end of the day. So I think it's really important. I think one of the things that, really, an identity itself is we do it very linear today, where it's one-time authentication, it's one-time access and then. Okay. Have a nice day. It's got to be a constant dynamic checking and rechecking of many other factors, as well as authentication and access. It's going to be continuous.</p><p><strong>Jason Wilburn:</strong> Yeah. You're completely right, Gerald. Identity really is just one more data point to determine access to something, right?</p><p><strong>Gerald Caron:</strong> Yeah, I totally agree. I just like to clarify that that's just one piece of it. [crosstalk 00:14:01].</p><p><strong>Ryan Johnson:</strong> Not the entire enchilada, if you will.</p><p><strong>Gerald Caron:</strong> Correct because I see a lot of people talk about it that way.</p><p><strong>Jason Wilburn:</strong> No, no.</p><p><strong>Ryan Johnson:</strong> Yeah, I would agree with you on that because a lot of places aren't doing that currently, and they think this is the solution, but it's just, like you said, part of the solution.</p><p><strong>Jason Wilburn: </strong>Right. The enforcement point, like to take back to Scott's document, with the 207, the enforcement point's right, they will know about the identity, but the enforcement point takes in a lot more consideration beyond just the user's identity. There's all that telemetry data that we're getting in. What's the machines coming from? What they're trying to access? There's lots more information than just the user identity to determine access control.</p><p><strong>Gerald Caron: </strong>Right. It's not always a human, right.</p><p><strong>Jason Wilburn:</strong> That's right.</p><p><strong>Gerald Caron: </strong>There's data flowing all the time and then there's data at rest. So, you got to protect that. There's not always the human involved.</p><p><strong>Jason Wilburn: </strong>Completely right. So let's go down the road of what do we do with the service account that's coming from and making an API call from one PC to another PC in the same data center. How do you validate that and secure that beyond really when I think... a lot of times when we talk about zero trust, a lot of times we talk about remote users or just users in general, talking to resources and what we've been trying to get away from [inaudible 00:15:24] the user doesn't really matter where they live, whether they live in corporate environment or whether they live at home, or they're in Starbucks, where the user live resides doesn't really matter because at a network level, that's just an IP address.</p><p>We care about, one, how did they authenticate; and two, what device are they trying to access from, not just... is he on the corporate... The corporate land might give us more information and more telemetry by just being on the WiFi at Starbucks, but it's more than identity definitely.</p><p><strong>Ryan Johnson: </strong>One thing that really hits home for me is the proliferation of modern applications, and API's talking everything. You got APIs on the cloud or even within the same agency or interagency or app, however, and Gerald's point about these non-human interactions verifying those, especially, when it's so spread out with different APIs. To me that really hits home. The next question is to Scott. There are multiple architectures listed in the 800-207. Why would an organization choose one architecture over another?</p><p><strong>Scott Rose: </strong>Basically, as they need to look at whatever they're trying to push a zero trust architecture on, what workflow, what mission they're doing, all that will help decide which model will fit best for them. You got to take into account, both what they may already have owned or what technology needs they have, what can they just... what they can use anyway, just configure in a different way. Let's say they already went with vendor A and they have an installed base, but there are certain features that they're not using now, but as they move towards a zero trust architecture, they just turn those on because some things work better than others, some solutions require like agents installed, may not be able to put agents on things, especially if you're looking at [inaudible 00:17:28] an IoT kind of deployment. You can't push a lot of agents on the small form devices, but you have to go with a different model there.</p><p>But when it comes to the approaches that we described, like the enhanced identity governance, microsegmentation, software-defined perimeters, I think of the most mature as zero trust enterprises and architectures out there will have elements of all three. Those three approaches, we're just calling those like what is the load bearing technology that you're using in your architecture, whereas the models are more of what kind of products are you using, that dictates the model. Whereas like what technology are you putting the emphasis on, whether you're the identity management governance part, the micro segmentation parts, or using a software-defined networking or software-defined perimeter model. All those depends what's you're doing in that initial analysis, both what is the mission or workflow that you're working on to try and make more secure, and then you develop the other set of policies and controls around those, and then those guide you as to which model that you may be going towards.</p><p><strong>Ryan Johnson: </strong>Thank you, Scott. Appreciate that. Next question is to Gerald. Looking into the future, what's next in zero trust? What technologies are going to impact zero trust security or require security in a different way than we see right now?</p><p><strong>Gerald Caron: </strong>Technology moves so fast nowadays, you can't keep up. As I'm speaking right now something new, something new just come out that I don't know about. But Brandon, I think, mentioned SASE and edge computing. I think that's something that people are very much looking at services through the cloud. One of the things I advocate for that I'm looking at is I hate being tethered to an on-premise network. We're in a new normal. Everybody's working mobily now. I have to Boomerang back just to go back out to the cloud on the internet. So, how can I be untethered but to have all the security that I need in telemetry to make the right decisions is something that I'm looking at. So, it's something that I advocate for as well.</p><p>So, technology is moving so fast. I think some are a little more mature than others in this space. But I see it's going to be very much competitive because we're all looking this way now. I think, as I said before, we're all trying to become more effective at our cybersecurity, not just check marks and coming compliant. We really need to protect the data and then the things that we need to protect. I equate I get to protect the crown jewels versus the bologna sandwich. You can have my bologna sandwich. But I'm going to put my concentration on those crown jewels.</p><p>So understanding what's important to you and understanding what the heck is your risk posture. A lot of people struggle with accepting and understanding what their risk is. There is a lot of non-technical aspects to zero trust that people need to understand, the methodologies, what is your risk tolerance and the processes, and what is the data, and where is your data, and what is that categorization of that data. Those are all non-technical things. There's a lot of work in those areas that people do struggle with that I find. So, there's a lot. But I see every day talking with a lot of vendors, there's a lot of maturity in the space, and I just look forward to seeing some of the capabilities because there's a lot of concepts in 800-207, like I talked about ongoing authentication and ongoing access.</p><p>Right now, it's very linear still. That's something that would be maturing that people are looking at doing so. I think there's a lot. I look forward to it because a lot of people are putting their emphasis here, especially, with what we just experienced with the solar winds. There's a lot of focus in this area now, even more so if there wasn't before.</p><p><strong>Brandon Iske: </strong>Ryan, if I can add in there, I think, Gerald is spot on. I think, as we can build towards more dynamic access, conditional access, and then having applications be aware of that context to govern what I can and can't do what's on that application. I think that's where... As all this comes together, those are the type of outcomes that we start to get at, whether if I'm from a personal device and maybe a low-assurance model, maybe I can't download attachments or something, but I can view those or view some content. So, those additional granular controls, I think, start to come out there, become achievable once we have some of these capabilities, conditional access and aggregation of telemetry together as well.</p><p><strong>Jason Wilburn: </strong>If I can jump in, too, Ryan. I think that just being able to absorb the additional telemetry data, whether it be some sort of behavioral analytics coming out of a risk engine, just coming out of various security tools, I thought had mentioned this before, the breaking down of the silos between the team. I think that's one of the biggest things about zero trust. Holistically, from a security model perspective, what we're saying is that, hey, it all needs to work together as a single point of control that is closest to the resource, that Gerald mentioned. There can be some context around it that no longer is it just the firewall blocking IPEs and things like that, and DLP looking at data exfil, and antivirus looking at what's happening on the server from a virus perspective or malware happening on the client. It all needs to work together, and it all needs to come back because that becomes part of the behavior or of the workflow that's happening between the client and the resources for accessing so that we can truly understand, is this a permitted flow? Yeah, this is a permitted user coming from a permitted device to a resource that it should have allowed to.</p><p>But based off not just what happened at the very beginning of the session, but what's happening throughout the life of the session, what's changed throughout the life of the session, that becomes critically important to really secure everything day one because back to Gerald's data exfil comment. Cool. You've got access to the data right now. Should you be able to download some document or upload some document five minutes into the session based off what something has changed? Maybe not.</p><p><strong>Ryan Johnson: </strong>Yeah, I agree that's what we're trying to get to. All right. That concludes the first topic of the theory. Now, we're going to jump into the second topic, the reality, adopting zero trust. The first question is once again to Scott Rose. What components are available to federal entities to assist in forming zero trust architecture?</p><p><strong>Scott Rose: </strong>Well, most of these are not real solid technologies, but it's more of frameworks and things that may help. There are existing government programs already out there. Both like a DHS, they have their CDM program. There's FICAM, things like that. These are already in place to actually build these, kind of like what Gerald called the pillars of zero trust. They've already been in place for a while. We looked at how zero trust extends those, how those reliant on those programs.</p><p>I mean, as well as we have for NIST, there's the risk management framework. That isn't the end all be all, but you can think of that as a tool to help one level down. Once you've developed that architecture, the RMF can maybe help develop that set of controls and checks in place to actually ensure that what you're doing, you're implementing correctly to your stated goals. These things are in place that are basically technology neutral, that whatever vendors you're using, you can always apply these frameworks and tools to help along the way.</p><p>In a way, that NIST, the Special Publication 800-207, that's also... think of that as a framework, [inaudible 00:25:53] just both on the architects, but also the way that the architects can then talk to the procurement people. They can, hopefully, understand what exactly you want. So when the procurement and the architects talk to the vendors, they're all speaking that same set of term, not just [inaudible 00:26:09] randomly zero trust or something like that. There's actually a set of rules and uses for these technologies that they can both use as a common set of terms.</p><p><strong>Ryan Johnson: </strong>All right, next question... Thanks again for that, Scott. Next question is for Gerald. What are the things that enterprise needs to understand before migrating to ZTA or zero trust architecture?</p><p><strong>Gerald Caron: </strong>That's a really good question. Think of the difficulty that some folks are going to have. I mentioned the data, understanding the data, where it is, where it's going and what classification it is. The where it's going. Where is it normally go? What is the flow? What is normal look like? How do you baseline normal? That's going to be really difficult because understanding what normal looks like will depend on when something happens now, what actions do I have to take? So understanding where that data flow is, where that data resides, what it is, who owns it because you're going to have to work with data owners. It's going to take a village. It's not just the network guys, not just the IT guys. It's going to take a village to do with zero trust in my estimate at an agency.</p><p>But, as Scott was saying, be on the same page with terminology and things like that. But I think that's the difficult part. I think that answers one of the questions is how do you know what abnormal is? Well, you got to know what normal looks like to know what abnormal looks like. So I think that's really important. So, I like the inside out method, that start with the data, and then all right, what's facilitating access to that data. Device app. What do you do with those things, and then work back to the identity, given the right access to the right people at the right time.</p><p>We talked about this from the end user standpoint a lot. I want to go back to this. The administrators as well are very powerful. So you have to address the administrators. I think that gets lost a lot of times when people start talking about... They talk about users accessing data. Well, your administrators need to be addressed as well in a zero trust. So that's something that's difficult.</p><p>The one other thing I would say that's difficult, Ryan, is that we all, as different agencies, we all share data, we all classify it differently. If I want to share with Brandon a certain amount of data, I do sensitive but unclassified, but he may classify it in a different way. Where do we meet when we want to share data with those different classifications, so that we can properly do that? Then when I give Brandon my data, it's my data. He's going to be a good steward for it. If he doesn't have the right things in place, now, I've put my data out there. So, how can we all get on that same page? Interagency sharing is I think going to be a challenge as well.</p><p><strong>Ryan Johnson: </strong>Absolutely. It makes complete sense. That's a big, big challenge. Next question is for Brandon. Is it necessary to have a ZTA if the enterprise does not utilize cloud resources?</p><p><strong>Brandon Iske: </strong>Thank you for that question. I would say absolutely. Again, the threat is the same whether you're in the cloud or not. So, whether you have disconnected resources, or closed networks, or connected networks. You still have very similar threats to some extent. So I think it absolutely applies. Again whether you look across the pillars, whether it's identity or endpoint, we still have to do those same things and even what we're doing in DoD to enhance our identity ICAM processes. Again, it's all about authentication and account lifecycle management. Those are the big pieces that... We still have a long journey to get to from an enterprise perspective to get those under control in a better fashion than what we do today.</p><p>We have CAC or PIV programs that are very strong, but again, those are a strong authenticator. It's the entire lifecycle of the additional pieces of identity that come into play. Again, all those same concepts apply regardless of where the data or applications exist. Other efforts that we've done in this arena as well, too, I would say is our cloud-based internet isolation. So again, this is a way that we move the end user browsing to a cloud environment for our actual benefit. So, in this case, basically, my browsing session is going to be terminated in a cloud environment. From a data protection and exploit perspective, those drive by downloads basically would happen in that cloud environment, not on my endpoint. So, it actually comes to help us also in this mass telework environment as well, too.</p><p>So, I can split my traffic going straight to the cloud for browsing and not backhaul that all the way back to the VPN to come on to the internal network. So, that's given us a few really big benefits, again, in a very hybrid model where in some cases, we're using cloud; in other cases, we still have a huge set of legacy that's still going to be on-prem for the foreseeable future until they modernize or whatever schedule they have to modernize.</p><p><strong>Jason Wilburn: </strong>Brandon, if I could ask a question about the browser isolation component. Is this going to be in when a user is accessing internal resources inside of the agencies, or is this going to be also a service that's internet-facing? So, when a user's setting on-prem or anywhere, and he's now going to the internet once they go to Google, is all internet traffic really going to be browser isolated? Is that the envisioning?</p><p><strong>Brandon Iske: </strong>So, it is what we're doing. So, the basically .com or any commercial internet browsing [inaudible 00:31:55] capability [inaudible 00:31:57] .mil is going to bypass that. So, whether I'm on a VPN or the .mil resources already internet facing, those are the [inaudible 00:32:08]. So I mean, basically, you're not routing either way. So, it does allow us to basically not be backhauling that traffic back onto the doden or [inaudible 00:32:16] for duty terminology, for our internal network.</p><p><strong>Ryan Johnson: </strong>Thank you, Brandon. Next question is to Scott Rose. Looking to the future, what is next in zero trust? What technologies are going to impact it or acquired in a different way than what we see right now? I love the question.</p><p><strong>Scott Rose: </strong>Yeah. I don't know for sure because everybody makes predictions and are constantly surprised about how they don't pan out. But at least in the near term, I see a lot of people focusing both on IoT like we are as well. How do you get those and manage those in an automatic fashion? So, you don't actually have to have human administrators going out and touching all those devices or doing something to those devices. They're getting to the point where you can just quickly get them onboard them onto a network. You know exactly what they're doing because they say what they're doing in [inaudible 00:33:19]. Manufacturer vouches for them. You onboard them, you have go through the entire lifecycle, and you offboard them if you need to all in a more streamlined automated fashion. That's going to be coming on as people look for IoT solutions.</p><p>The other one is we're seeing more people looking at machine learning when it comes to developing user profiles as feedback to what we call like the policy engine or the trust algorithm moving on. Building up again, what does this user normally do in order to see when something abnormal happens? You always [inaudible 00:33:57] this. You have a person, say, working in HR, and they connect to this database with all the user information. They do roughly, say, three to five gigs of traffic going back and forth from this database a day. Suddenly, you see that jump up to 800 gigs. That should cause a red flag going up because that's abnormal. But then again, maybe it's because there's the annual performance review, where they're downloading everything and going through everything.</p><p>Maybe that happens every year at a certain time. Then again, you're building up that profile saying, "Okay, we know that does happen at a certain timeframe. So what happens outside of that timeframe, then maybe something strange is going on." Those kind of trends we're seeing, just try and improve the dynamic nature of zero trust. That's kind of the things that are just on the horizon and starting to appear.</p><p><strong>Ryan Johnson: </strong>Thank you, Scott. Next question is for Gerald. What mistakes or what are the biggest misunderstandings with zero trust in the industry or within federal entities right now?</p><p><strong>Gerald Caron: </strong>Definition. Understanding the totality of zero trust, understanding as a full architecture, full framework. People talk about it in bits and pieces. Unfortunately, some vendors will talk about zero trust, but you got to understand the whole landscape of it because they may come in and do the authentication and access management piece, but not do the data segmentation piece, or the app hardening piece, or network mapping for understanding where your data's flowing and things. So, understanding that it's not just a one-product thing. It is truly going to be an integration. It's going to take a whole effort, a whole village to do it.</p><p>So, really understanding and getting level set, and understanding the use cases and understanding what your risk tolerance is, is very important. What are you willing to take risk for? What's important to you? Putting your emphasis on what's important. The cafeteria schedule, okay. But your medical records, I'm going to put a little more emphasis on that probably than the cafeteria schedule. So, and understanding where does that reside? How do I protect that and things? So, really understanding what it is you're trying to accomplish, and then we all have our little special snowflakes in all of our different agencies. So, what is our little spin on things? So understanding what your use cases are, I think's really important.</p><p><strong>Ryan Johnson: </strong>Thank you, Gerald. Next question is for Jason. Let's go to another identity question, Jason. If identity is a new perimeter, what should federal agency entities consider when looking at making identity their enforcement point? How is this achieved?</p><p><strong>Jason Wilburn: </strong>So, it's not going to be the enforcement point. It's just going to be another piece of information, a data point that can be used by an enforcement point. To Gerald's point, it needs to be looked at holistically. Identity just needs to be one part of it. I think the biggest thing is understanding really where are all your identities within an organization. Are they all in active directory? Are they all in a SaaS-based [inaudible 00:37:22]? Do each application have their own directory structure? So, while you think that John Smith's account only exists in say active directory, it might exist in multiple locations. So then you need a good strategy to onboard identity, decommission identity, and then also validate identity. That means back into needing some sort of MFA or a good authentication method.</p><p><strong>Ryan Johnson: </strong>Next question is to Scott. What are the concerns a federal entity needs to understand before migrating to ZTA?</p><p><strong>Scott Rose: </strong>Well, the concerns I need to think or that they need to worry about is, basically, they need to know what they do, they need to know their mission, they need to know the risks inherent to that they're doing their mission, and then they need to know what they have, who both.... These are accounts of the network, the devices, the workflows, they need to have those knowledge at first. They need to be able to detect and monitor things previously before they can actually start moving down this road to zero trust because you can't really build a policy and a set of checks around things that you don't actually know. So, those are the main concerns.</p><p>Other concerns are how it will impact the users. We need to educate them to make sure everybody else is onboard because if the other kind of operating units in an organization or a federal agency or something, if they're not onboard, there's going to be a problem because the way things are... because they may result in the changes of the workflow of [inaudible 00:39:02] times. They're accessing things. What permissions they have or don't have? There's always that learning curve when you're trying to actually refine these policies. If that becomes aggravating, they're going to start trying to find ways around it. That's the last thing you want because then you have the shadow IT springing up behind it and things that you've sorted all these strange traffic that you're not seeing on the network, but people claim that it's very important for them to do their job. Those sorts of things. So you need to actually realize that going down the road of zero trust is a unified front. Everybody needs to take those steps together.</p><p><strong>Ryan Johnson: </strong>Yeah. Thank you, Scott. Probably the last question here, this is directed to Gerald once again. How does zero trust relate to TIC 3.0 and CDM?</p><p><strong>Gerald Caron: </strong>So, I think the great thing about CDM, for those that have been participating in it, it's such a good foundational things that I think you can build on for zero trust. I think Brandon said it, well, earlier, is like, you're probably already doing some things and taking a good inventory of some of those efforts that you already have going on, and how it fits into the zero trust architecture that... So, there may be some tweaks. TIC, I think, definitely is part of... a contributor to the solution, especially, some of these efforts that allow for the telemetry and the services to do that untethering that I was talking about, and get all that data and make decisions based off that.</p><p>Definitely. I think the way CDM is taking in and doing like the asset discovery, a lot of the understanding of the mapping, eventually in the subsequent phases later on to do the network access control, so you can quarantine or trigger an action on a device. There's a lot of good things that I think they provide some good building blocks that will get you a part of your zero trust solution. Not the totality. Of course, we've already talked about that, but I think there's some good foundational pieces that they've put in place that contribute to the overall zero trust architecture.</p><p><strong>Scott Rose:</strong> Yeah. To follow up on that, if you go through the part of the NIST 800-207, we have a coauthor from DHS, and he's the head of the TIC program. We made sure that, at least, the text that we had in those sections where we talk about CDM and TIC, we had a lot of input and overview from DHS there. So, he made sure that the wordings and both of the tone and both matchly don't contradict. So yeah, we made sure that we were expressing the fact that these programs are interlaced.</p><p> </p><p>Thanks for listening. If you would like more information on how Carahsoft or F5 can assist your federal agency, please visit www.carahsoft.com or email us at <a href="mailto:f5-sales@carahsoft.com">f5-sales@carahsoft.com</a>. Thanks again for listening, and have a great day.</p><p> </p>
]]></content:encoded>
      <enclosure length="40624054" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4db5a1ca-2fc1-4975-b27f-ec9febeab99d/audio/d757d1b3-26bf-4d3d-aeaa-309d9a761451/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>F5 Zero Trust Panel Discussion</itunes:title>
      <itunes:author>Carahsoft, F5</itunes:author>
      <itunes:duration>00:42:19</itunes:duration>
      <itunes:summary>In this podcast, F5 brings together some of the most respected names for a discussion on Zero Trust Architecture - Scott Rose, Computer Scientist at NIST and a co-author on NIST&apos;s 800-207 Zero Trust Architecture publication, and Gerald Caron, Director of Enterprise Network Management and 17-year veteran of the Department of State. Joining them is Brandon Iske, Chief Engineer at DISA, along with F5’s most knowledgeable Zero Trust Engineer, Jason Wilburn.</itunes:summary>
      <itunes:subtitle>In this podcast, F5 brings together some of the most respected names for a discussion on Zero Trust Architecture - Scott Rose, Computer Scientist at NIST and a co-author on NIST&apos;s 800-207 Zero Trust Architecture publication, and Gerald Caron, Director of Enterprise Network Management and 17-year veteran of the Department of State. Joining them is Brandon Iske, Chief Engineer at DISA, along with F5’s most knowledgeable Zero Trust Engineer, Jason Wilburn.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">50a7d96a-45eb-495b-8732-0ccab1fca1c7</guid>
      <title>Data Governance Implementations for the DoD Based on Lessons Learned from CMMC with AvePoint</title>
      <description><![CDATA[The introduction of the Cybersecurity Maturity Model Certification (CMMC) to the Defense Industrial Base (DIB) comes with a renewed emphasis on securing Controlled Unclassified Information (CUI) across all layers of the DoD supply chain. 

For DoD agencies and DIB contractors who are subject to CMMC, Microsoft 365 offers robust tools like DLP and AIP to protect content at the file level. However, to ensure CUI remains secure, IT requires an additional layer of control over where the data resides in their environment (i.e. Teams, SharePoint).  

Striking the balance between enabling end-users to collaborate efficiently while maintaining secure control over these collaboration workspaces requires a strong data governance strategy to be in place. 

In this podcast, listen to AvePoint Public Sector's Principal Solution Engineer, Jay Leask, and C3 Integrated Solutions President, Bill Wootton, to learn how organizations across the DIB are implementing smart data governance strategies to navigate the following challenges in their M365 environments: 

•	Reporting 
•	Decentralized provisioning  
•	Control over membership  
•	Inadvertent sharing  
•	Data classification  
•	Workspace recertification 
•	Lifecycle management 
 
]]></description>
      <pubDate>Fri, 5 Mar 2021 19:45:46 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, AvePoint)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/data-governance-implementations-for-the-dod-based-on-lessons-learned-from-cmmc-with-avepoint-_zIGjW_2</link>
      <enclosure length="50018181" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6c5c1659-a98f-430c-91cd-dff82ea39f46/audio/032a02cd-24e4-4bb6-b851-daa11fdee5d8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Data Governance Implementations for the DoD Based on Lessons Learned from CMMC with AvePoint</itunes:title>
      <itunes:author>Carahsoft, AvePoint</itunes:author>
      <itunes:duration>00:51:55</itunes:duration>
      <itunes:summary>The introduction of the Cybersecurity Maturity Model Certification (CMMC) to the Defense Industrial Base (DIB) comes with a renewed emphasis on securing Controlled Unclassified Information (CUI) across all layers of the DoD supply chain. 

For DoD agencies and DIB contractors who are subject to CMMC, Microsoft 365 offers robust tools like DLP and AIP to protect content at the file level. However, to ensure CUI remains secure, IT requires an additional layer of control over where the data resides in their environment (i.e. Teams, SharePoint).  

Striking the balance between enabling end-users to collaborate efficiently while maintaining secure control over these collaboration workspaces requires a strong data governance strategy to be in place. 

In this podcast, listen to AvePoint Public Sector&apos;s Principal Solution Engineer, Jay Leask, and C3 Integrated Solutions President, Bill Wootton, to learn how organizations across the DIB are implementing smart data governance strategies to navigate the following challenges in their M365 environments: 

•	Reporting 
•	Decentralized provisioning  
•	Control over membership  
•	Inadvertent sharing  
•	Data classification  
•	Workspace recertification 
•	Lifecycle management 
</itunes:summary>
      <itunes:subtitle>The introduction of the Cybersecurity Maturity Model Certification (CMMC) to the Defense Industrial Base (DIB) comes with a renewed emphasis on securing Controlled Unclassified Information (CUI) across all layers of the DoD supply chain. 

For DoD agencies and DIB contractors who are subject to CMMC, Microsoft 365 offers robust tools like DLP and AIP to protect content at the file level. However, to ensure CUI remains secure, IT requires an additional layer of control over where the data resides in their environment (i.e. Teams, SharePoint).  

Striking the balance between enabling end-users to collaborate efficiently while maintaining secure control over these collaboration workspaces requires a strong data governance strategy to be in place. 

In this podcast, listen to AvePoint Public Sector&apos;s Principal Solution Engineer, Jay Leask, and C3 Integrated Solutions President, Bill Wootton, to learn how organizations across the DIB are implementing smart data governance strategies to navigate the following challenges in their M365 environments: 

•	Reporting 
•	Decentralized provisioning  
•	Control over membership  
•	Inadvertent sharing  
•	Data classification  
•	Workspace recertification 
•	Lifecycle management 
</itunes:subtitle>
      <itunes:keywords>cmmc, data governance implementations, avepoint</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">03425efb-a8b2-4811-ac72-ef8741415b7d</guid>
      <title>Securely Modernize Your Workloads with Google Cloud</title>
      <description><![CDATA[<p>Listen to this podcast to hear insights on:</p><ul><li>GCP Administration Fundamentals: reviewing various services, billing, and support cases and navigating the UI, IAM, etc.</li><li>Running VMware workloads natively on GCP</li><li>Application Modernization by deploying containerized apps into Cloud Run, Google Kubernetes Engine (GKE), and Google Anthos</li><li>Modernization of Data and Analytics workloads on GCP using Pub/Sub, Dataflow, BigQuery, Data Catalog, Data Studio, and Looker</li></ul>
]]></description>
      <pubDate>Thu, 4 Mar 2021 21:22:43 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Google Cloud)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/securely-modernize-your-workloads-with-google-cloud-44EDnMUR</link>
      <content:encoded><![CDATA[<p>Listen to this podcast to hear insights on:</p><ul><li>GCP Administration Fundamentals: reviewing various services, billing, and support cases and navigating the UI, IAM, etc.</li><li>Running VMware workloads natively on GCP</li><li>Application Modernization by deploying containerized apps into Cloud Run, Google Kubernetes Engine (GKE), and Google Anthos</li><li>Modernization of Data and Analytics workloads on GCP using Pub/Sub, Dataflow, BigQuery, Data Catalog, Data Studio, and Looker</li></ul>
]]></content:encoded>
      <enclosure length="45221465" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/aace439d-0167-4ea2-b911-9e1db70cd9a8/audio/37b8f327-d999-48b9-b64b-45910775b083/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Securely Modernize Your Workloads with Google Cloud</itunes:title>
      <itunes:author>Carahsoft, Google Cloud</itunes:author>
      <itunes:duration>00:47:06</itunes:duration>
      <itunes:summary>In this podcast, Google Cloud Customer Engineer, Karim Atek demonstrates the fundamentals of Google Cloud Platform and Application Modernization.</itunes:summary>
      <itunes:subtitle>In this podcast, Google Cloud Customer Engineer, Karim Atek demonstrates the fundamentals of Google Cloud Platform and Application Modernization.</itunes:subtitle>
      <itunes:keywords>google cloud, securely modernize workloads</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e0993349-c7ef-47e8-8954-75151aff320a</guid>
      <title>Strategies for Zero Trust Today, Not Tomorrow</title>
      <description><![CDATA[During this podcast, experts from Okta, Zscaler, and GuidePoint discuss how some agencies are approaching their Zero Trust journey, successful use cases, and best practices agencies should consider. 
]]></description>
      <pubDate>Thu, 4 Mar 2021 17:37:42 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, GuidePoint, Zscaler, Okta)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/strategies-for-zero-trust-today-not-tomorrow-hDF2VSOR</link>
      <enclosure length="48977184" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b8608277-88c8-4ca9-a622-015fb0f95e32/audio/b6395e00-0207-418e-a49a-c2b35cdc762f/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Strategies for Zero Trust Today, Not Tomorrow</itunes:title>
      <itunes:author>Carahsoft, GuidePoint, Zscaler, Okta</itunes:author>
      <itunes:duration>00:50:58</itunes:duration>
      <itunes:summary>During this podcast, experts from Okta, Zscaler, and GuidePoint discuss how some agencies are approaching their Zero Trust journey, successful use cases, and best practices agencies should consider.</itunes:summary>
      <itunes:subtitle>During this podcast, experts from Okta, Zscaler, and GuidePoint discuss how some agencies are approaching their Zero Trust journey, successful use cases, and best practices agencies should consider.</itunes:subtitle>
      <itunes:keywords>zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8346589d-6758-4fd8-90fd-417bbc87ee14</guid>
      <title>Topics in Government Mainframe Transformation to Azure Gov Cloud with Microsoft</title>
      <description><![CDATA[In this podcast, Topics in Government Mainframe Transformation to Azure Gov Cloud, Microsoft’s Azure Global Engineering – Critical Infrastructure team discuss transitioning from mainframe, midrange, and other non-x86 platforms into Azure Gov cloud, including uses cases, technology patterns, and example reference architectures. 
]]></description>
      <pubDate>Fri, 26 Feb 2021 16:25:01 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Microsoft, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/topics-in-government-mainframe-transformation-to-azure-gov-cloud-with-microsoft-foOq_vB1</link>
      <enclosure length="46992173" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/714bd510-67dc-40f2-8bba-b3cd84f8e2d8/audio/e86c7e7a-31f6-47c9-9c4e-efdd0a0c28d3/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Topics in Government Mainframe Transformation to Azure Gov Cloud with Microsoft</itunes:title>
      <itunes:author>Microsoft, Carahsoft</itunes:author>
      <itunes:duration>00:48:56</itunes:duration>
      <itunes:summary>In this podcast, Topics in Government Mainframe Transformation to Azure Gov Cloud, Microsoft’s Azure Global Engineering – Critical Infrastructure team discuss transitioning from mainframe, midrange, and other non-x86 platforms into Azure Gov cloud, including uses cases, technology patterns, and example reference architectures.</itunes:summary>
      <itunes:subtitle>In this podcast, Topics in Government Mainframe Transformation to Azure Gov Cloud, Microsoft’s Azure Global Engineering – Critical Infrastructure team discuss transitioning from mainframe, midrange, and other non-x86 platforms into Azure Gov cloud, including uses cases, technology patterns, and example reference architectures.</itunes:subtitle>
      <itunes:keywords>azure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d1086996-2749-4ad7-9fb5-691d22e32693</guid>
      <title>Technology Trends in 2021: Artificial Intelligence and Machine Learning</title>
      <description><![CDATA[In today’s environment, the government is continuously searching for ways to modernize and take risks. Embracing what Artificial Intelligence and Machine Learning have to offer is more important now than ever. With new trends on the rise, agencies are learning what they can do with this technology.

In this podcast, NVIDIA’s Adam Thompson discusses Artificial Intelligence and Machine Learning, its importance over the last year and what we can expect to see in the next year as part of Carahsoft’s community blog series focused on mission critical IT trends in 2021.
 
]]></description>
      <pubDate>Fri, 26 Feb 2021 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (NVIDIA, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/technology-trends-in-2021-artificial-intelligence-and-machine-learning-ujyiCFO9</link>
      <enclosure length="23641537" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d774e69c-fd32-4892-aa54-ee59615ee133/audio/a447d0e7-e78d-4a67-8c0a-effebec4aa8b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Technology Trends in 2021: Artificial Intelligence and Machine Learning</itunes:title>
      <itunes:author>NVIDIA, Carahsoft</itunes:author>
      <itunes:duration>00:24:38</itunes:duration>
      <itunes:summary>In today’s environment, the government is continuously searching for ways to modernize and take risks. Embracing what Artificial Intelligence and Machine Learning have to offer is more important now than ever. With new trends on the rise, agencies are learning what they can do with this technology.

In this podcast, NVIDIA’s Adam Thompson discusses Artificial Intelligence and Machine Learning, its importance over the last year and what we can expect to see in the next year as part of Carahsoft’s community blog series focused on mission critical IT trends in 2021.
</itunes:summary>
      <itunes:subtitle>In today’s environment, the government is continuously searching for ways to modernize and take risks. Embracing what Artificial Intelligence and Machine Learning have to offer is more important now than ever. With new trends on the rise, agencies are learning what they can do with this technology.

In this podcast, NVIDIA’s Adam Thompson discusses Artificial Intelligence and Machine Learning, its importance over the last year and what we can expect to see in the next year as part of Carahsoft’s community blog series focused on mission critical IT trends in 2021.
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bc679128-62db-4b98-b0d4-8476836e4d60</guid>
      <title>Accelerating CI/CD Cycles with Programmable Data Infrastructure with Delphix</title>
      <description><![CDATA[In this podcast, Aaron Jensen, the Senior Solutions Engineer at Delphix and Arif Hajee, the Principal Solutions Engineer at Delphix explain how a programmable data infrastructure ensures test data can keep pace with high-velocity development and improve development productivity. 
]]></description>
      <pubDate>Thu, 25 Feb 2021 18:34:55 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Delphix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/accelerating-ci-cd-cycles-with-programmable-data-infrastructure-with-delphix-1_CdjoZO</link>
      <enclosure length="32773457" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/b781b7b7-d8ed-4012-b19a-e39e5002a70b/audio/9a8e03f1-9206-44b1-8a96-2d6a19ab4874/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Accelerating CI/CD Cycles with Programmable Data Infrastructure with Delphix</itunes:title>
      <itunes:author>Delphix, Carahsoft</itunes:author>
      <itunes:duration>00:34:07</itunes:duration>
      <itunes:summary>In this podcast, Aaron Jensen, the Senior Solutions Engineer at Delphix and Arif Hajee, the Principal Solutions Engineer at Delphix explain how a programmable data infrastructure ensures test data can keep pace with high-velocity development and improve development productivity.</itunes:summary>
      <itunes:subtitle>In this podcast, Aaron Jensen, the Senior Solutions Engineer at Delphix and Arif Hajee, the Principal Solutions Engineer at Delphix explain how a programmable data infrastructure ensures test data can keep pace with high-velocity development and improve development productivity.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0ad6af4e-3998-4fa5-9278-cdf928d28e61</guid>
      <title>How Can the Government and Education Sector Improve Its Grades in Software Security Health with Veracode?</title>
      <description><![CDATA[In this podcast, Eric Wassenaar, the Senior Account Executive of SLED at Veracode and Jason Phillips, the Senior Solution Architect at Veracode examine SOSS findings pertaining to the government and education sector. 
]]></description>
      <pubDate>Wed, 17 Feb 2021 21:28:41 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Veracode)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-can-the-government-and-education-sector-improve-its-grades-in-software-security-health-with-veracode-rXObs_K0</link>
      <enclosure length="37063338" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/67fe8157-c327-430b-8361-1ec273051898/audio/48e87866-0b93-49c6-a3f7-14b9fa18471e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How Can the Government and Education Sector Improve Its Grades in Software Security Health with Veracode?</itunes:title>
      <itunes:author>Carahsoft, Veracode</itunes:author>
      <itunes:duration>00:38:35</itunes:duration>
      <itunes:summary>In this podcast, Eric Wassenaar, the Senior Account Executive of SLED at Veracode and Jason Phillips, the Senior Solution Architect at Veracode examine SOSS findings pertaining to the government and education sector.</itunes:summary>
      <itunes:subtitle>In this podcast, Eric Wassenaar, the Senior Account Executive of SLED at Veracode and Jason Phillips, the Senior Solution Architect at Veracode examine SOSS findings pertaining to the government and education sector.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">514a871a-270c-421c-b1ac-de3f25c09a36</guid>
      <title>Hybrid Cloud for DevSecOps with Nutanix</title>
      <description><![CDATA[Listen to Nutanix’s Account Manager, Patrick Conaway, discuss Nutanix hybrid cloud’s ability to unify operations across all IT sites and clouds, simplify tasks, improve service delivery, and accelerate adoption of DevSecOps within your organization. 
]]></description>
      <pubDate>Wed, 3 Feb 2021 19:49:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/hybrid-cloud-for-devsecops-with-nutanix-btvM0caR</link>
      <enclosure length="23502905" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/cce82dd5-a0c0-45ec-b421-ab7c76c1f3d0/audio/db7070b4-915b-45d3-af33-54052e7f2c32/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Hybrid Cloud for DevSecOps with Nutanix</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:24:28</itunes:duration>
      <itunes:summary>Listen to Nutanix’s Account Manager, Patrick Conaway, discuss Nutanix hybrid cloud’s ability to unify operations across all IT sites and clouds, simplify tasks, improve service delivery, and accelerate adoption of DevSecOps within your organization.</itunes:summary>
      <itunes:subtitle>Listen to Nutanix’s Account Manager, Patrick Conaway, discuss Nutanix hybrid cloud’s ability to unify operations across all IT sites and clouds, simplify tasks, improve service delivery, and accelerate adoption of DevSecOps within your organization.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">63336061-c73d-4d42-9757-7f1bf498e110</guid>
      <title>Optimize Your Nutanix Deployment with Prism Pro</title>
      <description><![CDATA[Listen to this podcast to hear Jason Malnar, Senior System Engineer at Nutanix, discuss the enhanced features and capabilities of Nutanix Prism Pro and how it can dramatically improve your virtualization and infrastructure management with predictive analytics and task automation. 
]]></description>
      <pubDate>Mon, 1 Feb 2021 14:34:33 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/optimize-your-nutanix-deployment-with-prism-pro-A6JRPkeL</link>
      <enclosure length="20090800" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0f8e6546-9411-4653-a9b9-9b2311e14b51/audio/b6e6eaa1-a4c0-4cd2-8494-95ea8477cdbb/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Optimize Your Nutanix Deployment with Prism Pro</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:20:54</itunes:duration>
      <itunes:summary>Listen to this podcast to hear Jason Malnar, Senior System Engineer at Nutanix, discuss the enhanced features and capabilities of Nutanix Prism Pro and how it can dramatically improve your virtualization and infrastructure management with predictive analytics and task automation.</itunes:summary>
      <itunes:subtitle>Listen to this podcast to hear Jason Malnar, Senior System Engineer at Nutanix, discuss the enhanced features and capabilities of Nutanix Prism Pro and how it can dramatically improve your virtualization and infrastructure management with predictive analytics and task automation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3b7b1641-66ae-4a69-a08e-098632d7a722</guid>
      <title>Simplify &amp; Automate Database Operations for Any Cloud with Nutanix</title>
      <description><![CDATA[Listen to Nutanix Systems Engineer, Derik Davenport, discuss how you can harness cloud-like services for your federal agency’s database operations. 
]]></description>
      <pubDate>Fri, 29 Jan 2021 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Nutanix)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/simplify-automate-database-operations-for-any-cloud-with-nutanix-moJENlEb</link>
      <enclosure length="26506224" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c5d9d926-0887-448e-9fcd-a09fe3f84456/audio/3ac457a7-fa31-41a6-9d69-b8eb6e4ff032/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Simplify &amp; Automate Database Operations for Any Cloud with Nutanix</itunes:title>
      <itunes:author>Carahsoft, Nutanix</itunes:author>
      <itunes:duration>00:27:37</itunes:duration>
      <itunes:summary>Listen to Nutanix Systems Engineer, Derik Davenport, discuss how you can harness cloud-like services for your federal agency’s database operations.</itunes:summary>
      <itunes:subtitle>Listen to Nutanix Systems Engineer, Derik Davenport, discuss how you can harness cloud-like services for your federal agency’s database operations.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">96e9ee9b-b7af-4b97-96a5-6942c6e9a775</guid>
      <title>Simplifying Operations: Datacenter to Desktop</title>
      <description><![CDATA[Listen to Nutanix Systems Engineer, Daeric Graeber, Nutanix's end-to-end consumer-grade management and desktop as a service (DaaS) solutions. 
]]></description>
      <pubDate>Thu, 28 Jan 2021 21:59:06 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/simplifying-operations-datacenter-to-desktop-nVBevnTw</link>
      <enclosure length="20366953" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/fba83186-63c6-4a6b-bd75-3970067bb82b/audio/26523f87-47b7-4fc5-a867-d58107414582/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Simplifying Operations: Datacenter to Desktop</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:21:12</itunes:duration>
      <itunes:summary>Listen to Nutanix Systems Engineer, Daeric Graeber, Nutanix&apos;s end-to-end consumer-grade management and desktop as a service (DaaS) solutions.</itunes:summary>
      <itunes:subtitle>Listen to Nutanix Systems Engineer, Daeric Graeber, Nutanix&apos;s end-to-end consumer-grade management and desktop as a service (DaaS) solutions.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a751632e-f076-49b1-b229-40a6e227cf94</guid>
      <title>Election Security: 2020 and Beyond with FedInsider</title>
      <description><![CDATA[Election officials throughout the country, armed with cyber-trooper support from Washington, went on the offensive this year and staved off significant cyber penetration of the election process. 
]]></description>
      <pubDate>Fri, 22 Jan 2021 16:34:04 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Akamai, Okta, FedInsider)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/election-security-2020-and-beyond-a4gNsewd</link>
      <enclosure length="77856455" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/15f6ab60-2715-41ab-8daf-53aad657dd75/audio/b908cc14-d138-4b01-8d41-7b7a1a7fb008/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Election Security: 2020 and Beyond with FedInsider</itunes:title>
      <itunes:author>Carahsoft, Akamai, Okta, FedInsider</itunes:author>
      <itunes:duration>01:21:03</itunes:duration>
      <itunes:summary>Election officials throughout the country, armed with cyber-trooper support from Washington, went on the offensive this year and staved off significant cyber penetration of the election process.</itunes:summary>
      <itunes:subtitle>Election officials throughout the country, armed with cyber-trooper support from Washington, went on the offensive this year and staved off significant cyber penetration of the election process.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e323ae5e-da39-4f04-9806-2915468452a9</guid>
      <title>Technology Trends in 2021: Workflow Automation with Adobe</title>
      <description><![CDATA[With the coronavirus pandemic, organizations and offices have had to adjust from daily face-to-face contact to phone calls and video chats. During this time, workflow automation has become an integral part of keeping companies as efficient and productive as possible.

In this podcast, Adobe’s Wayne Byrd, an Account Executive for the US Air Force and Yasir Saleem, a Principal Solutions Consultant discuss Workflow Automation, its importance over the last year and what we can expect to see in the next year as part of Carahsoft’s community blog series focused on mission critical IT trends in 2021. 
]]></description>
      <pubDate>Tue, 19 Jan 2021 16:24:02 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Adobe, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/technology-trends-in-2021-workflow-automation-with-adobe-naGKd8YL</link>
      <enclosure length="42294219" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/6eabdbaf-3dfd-4699-9617-e4a7d9ed17a1/audio/71f28e73-0912-429e-87e2-0d0e89204e3c/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Technology Trends in 2021: Workflow Automation with Adobe</itunes:title>
      <itunes:author>Adobe, Carahsoft</itunes:author>
      <itunes:duration>00:44:04</itunes:duration>
      <itunes:summary>With the coronavirus pandemic, organizations and offices have had to adjust from daily face-to-face contact to phone calls and video chats. During this time, workflow automation has become an integral part of keeping companies as efficient and productive as possible.

In this podcast, Adobe’s Wayne Byrd, an Account Executive for the US Air Force and Yasir Saleem, a Principal Solutions Consultant discuss Workflow Automation, its importance over the last year and what we can expect to see in the next year as part of Carahsoft’s community blog series focused on mission critical IT trends in 2021.</itunes:summary>
      <itunes:subtitle>With the coronavirus pandemic, organizations and offices have had to adjust from daily face-to-face contact to phone calls and video chats. During this time, workflow automation has become an integral part of keeping companies as efficient and productive as possible.

In this podcast, Adobe’s Wayne Byrd, an Account Executive for the US Air Force and Yasir Saleem, a Principal Solutions Consultant discuss Workflow Automation, its importance over the last year and what we can expect to see in the next year as part of Carahsoft’s community blog series focused on mission critical IT trends in 2021.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f3923fd2-1481-4fd3-a3a0-9bee15c94b32</guid>
      <title>Simple, Flexible, Intelligent File Storage for State, Local, and Education Organizations with Nutanix</title>
      <description><![CDATA[In this podcast, Mike Cameron, System Engineer at Nutanix, discusses how to eliminate complexity with a single click deployment for state and local government and education. 
]]></description>
      <pubDate>Fri, 15 Jan 2021 14:47:59 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/simple-flexible-intelligent-file-storage-for-state-local-and-education-organizations-with-nutanix-RHROnJxk</link>
      <enclosure length="11607013" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/5bd8494a-5504-4e9c-8a94-da5d51894973/audio/89cfddb1-ae00-42a2-a658-62c0225c2367/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Simple, Flexible, Intelligent File Storage for State, Local, and Education Organizations with Nutanix</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:12:05</itunes:duration>
      <itunes:summary>In this podcast, Mike Cameron, System Engineer at Nutanix, discusses how to eliminate complexity with a single click deployment for state and local government and education.</itunes:summary>
      <itunes:subtitle>In this podcast, Mike Cameron, System Engineer at Nutanix, discusses how to eliminate complexity with a single click deployment for state and local government and education.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e8507369-1547-49d2-bcca-1954b48ab4dc</guid>
      <title>Nutanix HCI for State and Local Government and Education</title>
      <description><![CDATA[Hyperconverged infrastructure (HCI) can lower cost, improve performance, and increase efficiency all with a smaller datacenter footprint. In this podcast, Luis Gomez, Sr. System Engineer at Nutanix, discusses the value of Nutanix HCI brings to you and your organization. 
]]></description>
      <pubDate>Wed, 13 Jan 2021 21:51:56 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/nutanix-hci-for-state-and-local-government-and-education-3oO_7KH2</link>
      <enclosure length="25301310" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/c2bff79c-038d-4ccc-93b3-9964cb6b2ac3/audio/eb010dad-c3b1-4304-aee2-f6d8f486bcd7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Nutanix HCI for State and Local Government and Education</itunes:title>
      <itunes:author>Nutanix</itunes:author>
      <itunes:duration>00:26:21</itunes:duration>
      <itunes:summary>Hyperconverged infrastructure (HCI) can lower cost, improve performance, and increase efficiency all with a smaller datacenter footprint. In this podcast, Luis Gomez, Sr. System Engineer at Nutanix, discusses the value of Nutanix HCI brings to you and your organization.</itunes:summary>
      <itunes:subtitle>Hyperconverged infrastructure (HCI) can lower cost, improve performance, and increase efficiency all with a smaller datacenter footprint. In this podcast, Luis Gomez, Sr. System Engineer at Nutanix, discusses the value of Nutanix HCI brings to you and your organization.</itunes:subtitle>
      <itunes:keywords>local government, education</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a669cd4c-a669-4238-9f05-bbe2decfb4a5</guid>
      <title>Transforming DevSecOps with Cloud Native Security</title>
      <description><![CDATA[Federal agencies are increasingly viewing DevSecOps as an enabler of their migration to the cloud. DevSecOps brings rapid application development, more reliable applications, and increased security to their applications. Palo Alto Networks has continued to enable our customers to streamline their application development and shift security left.

Listen to the podcast to hear Brain Wegner, Systems Engineer for Palo Alto Networks, discuss how solutions have enabled our customers to achieve a Continuous Authority to Operate (cATO) and implement Zero Trust Architecture for the applications. 
]]></description>
      <pubDate>Wed, 6 Jan 2021 05:00:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Palo Alto Networks)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/transforming-devsecops-with-cloud-native-security-eHcRYwjO</link>
      <enclosure length="40948809" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d4e5c0b8-31e7-4040-8464-d42f98716f05/audio/27d83774-5355-43b9-ad84-71d358b26f56/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Transforming DevSecOps with Cloud Native Security</itunes:title>
      <itunes:author>Carahsoft, Palo Alto Networks</itunes:author>
      <itunes:duration>00:42:40</itunes:duration>
      <itunes:summary>Federal agencies are increasingly viewing DevSecOps as an enabler of their migration to the cloud. DevSecOps brings rapid application development, more reliable applications, and increased security to their applications. Palo Alto Networks has continued to enable our customers to streamline their application development and shift security left.

Listen to the podcast to hear Brain Wegner, Systems Engineer for Palo Alto Networks, discuss how solutions have enabled our customers to achieve a Continuous Authority to Operate (cATO) and implement Zero Trust Architecture for the applications.</itunes:summary>
      <itunes:subtitle>Federal agencies are increasingly viewing DevSecOps as an enabler of their migration to the cloud. DevSecOps brings rapid application development, more reliable applications, and increased security to their applications. Palo Alto Networks has continued to enable our customers to streamline their application development and shift security left.

Listen to the podcast to hear Brain Wegner, Systems Engineer for Palo Alto Networks, discuss how solutions have enabled our customers to achieve a Continuous Authority to Operate (cATO) and implement Zero Trust Architecture for the applications.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">65a9c39f-0cb9-487c-88d7-b6bb5be6dd02</guid>
      <title>Optimize Your Enterprise Cloud with Nutanix Xi Beam</title>
      <description><![CDATA[Listen to John Bowles, Senior Systems Engineer at Nutanix discuss how Nutanix's multi-cloud platform, Xi Beam, provides security compliance and cost governance capabilities for public and private clouds. 
]]></description>
      <pubDate>Tue, 29 Dec 2020 16:46:49 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/optimize-your-enterprise-cloud-with-nutanix-xi-beam-uUG8YDqm</link>
      <enclosure length="10577962" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/7e072d8e-33c3-40e8-ae2c-bfb2ccefdbe0/audio/d027252d-f2f0-4f7c-afa8-81a70e345135/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Optimize Your Enterprise Cloud with Nutanix Xi Beam</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:11:01</itunes:duration>
      <itunes:summary>Listen to John Bowles, Senior Systems Engineer at Nutanix discuss how Nutanix&apos;s multi-cloud platform, Xi Beam, provides security compliance and cost governance capabilities for public and private clouds.</itunes:summary>
      <itunes:subtitle>Listen to John Bowles, Senior Systems Engineer at Nutanix discuss how Nutanix&apos;s multi-cloud platform, Xi Beam, provides security compliance and cost governance capabilities for public and private clouds.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">44765b04-b037-47c2-9805-943cda2b70cc</guid>
      <title>Digital Transformation and Lessons Learned From Our Healthcare Providers with VMware</title>
      <description><![CDATA[In Carahsoft’s new podcast, Digital Transformation and Lessons Learned From Our Healthcare Providers, our special guest speakers from the VMware Healthcare Industry Strategy Team discuss how the COVID-19 Pandemic is forcing dramatic IT Transformation, and the new ways that healthcare providers are delivering care. 
]]></description>
      <pubDate>Mon, 28 Dec 2020 18:26:14 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (VMware, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/digital-transformation-and-lessons-learned-from-our-healthcare-providers-with-vmware-QcgLoJmf</link>
      <enclosure length="28980067" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ed7b6693-6087-459e-a08d-524e990bf93f/audio/5029f83b-a20d-4e74-8bed-c4c71397205b/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Digital Transformation and Lessons Learned From Our Healthcare Providers with VMware</itunes:title>
      <itunes:author>VMware, Carahsoft</itunes:author>
      <itunes:duration>00:30:06</itunes:duration>
      <itunes:summary>In Carahsoft’s new podcast, Digital Transformation and Lessons Learned From Our Healthcare Providers, our special guest speakers from the VMware Healthcare Industry Strategy Team discuss how the COVID-19 Pandemic is forcing dramatic IT Transformation, and the new ways that healthcare providers are delivering care.</itunes:summary>
      <itunes:subtitle>In Carahsoft’s new podcast, Digital Transformation and Lessons Learned From Our Healthcare Providers, our special guest speakers from the VMware Healthcare Industry Strategy Team discuss how the COVID-19 Pandemic is forcing dramatic IT Transformation, and the new ways that healthcare providers are delivering care.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9626837c-726e-4f7a-a758-97462106f8b6</guid>
      <title>Protecting Your Network in the Post-COVID Environment with IronNet&amp;AWS</title>
      <description><![CDATA[COVID-19 has disrupted many aspects of the ways in which government operates, and one major change that agencies must address are the new ways in which threat actors use this time of change and uncertainty to their advantage.

In order to scale defenses rapidly to protect themselves in this post-COVID cyber threat landscape, agencies should adopt a strategy of collective defense.

 
]]></description>
      <pubDate>Thu, 17 Dec 2020 15:00:13 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, IronNet, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/protecting-your-network-in-the-post-covid-environment-with-ironnetaws-a_yPIu3Z</link>
      <enclosure length="41319096" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e54328de-63cf-4063-bc60-ab91caf91fc9/audio/d2fa78ff-6f34-4963-8605-ace82ecc73af/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Protecting Your Network in the Post-COVID Environment with IronNet&amp;AWS</itunes:title>
      <itunes:author>AWS, IronNet, Carahsoft</itunes:author>
      <itunes:duration>00:42:48</itunes:duration>
      <itunes:summary>COVID-19 has disrupted many aspects of the ways in which government operates, and one major change that agencies must address are the new ways in which threat actors use this time of change and uncertainty to their advantage.

In order to scale defenses rapidly to protect themselves in this post-COVID cyber threat landscape, agencies should adopt a strategy of collective defense.

</itunes:summary>
      <itunes:subtitle>COVID-19 has disrupted many aspects of the ways in which government operates, and one major change that agencies must address are the new ways in which threat actors use this time of change and uncertainty to their advantage.

In order to scale defenses rapidly to protect themselves in this post-COVID cyber threat landscape, agencies should adopt a strategy of collective defense.

</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7270de6a-23ee-4a64-a6bf-ff38b2d57b6b</guid>
      <title>Bring Your Infrastructure Together with Nutanix</title>
      <description><![CDATA[Listen to this podcast, to learn more on how Nutanix HCI can:
•Reduce the physical footprint of legacy datacenter infrastructure 
•Increase and leverage underutilized resources 
•Improve IT security posture 
•Modernize environments for the cloud era
 
]]></description>
      <pubDate>Wed, 16 Dec 2020 17:53:26 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/bring-your-infrastructure-together-with-nutanix-gVfDlI_e</link>
      <enclosure length="20551560" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/62dc5431-98a6-4e31-b040-9b5c291475c6/audio/89f4fd6b-6bcd-45b1-bc8f-352d114e1eaa/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Bring Your Infrastructure Together with Nutanix</itunes:title>
      <itunes:author>Carahsoft</itunes:author>
      <itunes:duration>00:21:24</itunes:duration>
      <itunes:summary>Listen to this podcast, to learn more on how Nutanix HCI can:
•Reduce the physical footprint of legacy datacenter infrastructure 
•Increase and leverage underutilized resources 
•Improve IT security posture 
•Modernize environments for the cloud era
</itunes:summary>
      <itunes:subtitle>Listen to this podcast, to learn more on how Nutanix HCI can:
•Reduce the physical footprint of legacy datacenter infrastructure 
•Increase and leverage underutilized resources 
•Improve IT security posture 
•Modernize environments for the cloud era
</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">383a2b2e-d13e-4102-bd2d-9995f236b372</guid>
      <title>Atlassian License Sales: Benefits of engaging an Atlassian Platinum Partner</title>
      <description><![CDATA[In this podcast Mick Flanigan, Senior Director of Professional Services, for Contegix covers Atlassian license purchasing options, how to choose a reseller, working with a solutions partner, and so much more. Tune in for an insight into the benefits of buying through a solution partner versus alternative options! 
]]></description>
      <pubDate>Wed, 16 Dec 2020 13:59:49 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Contegix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/atlassian-license-sales-benefits-in-engaging-an-atlassian-platinum-partner-ih2UMCza</link>
      <enclosure length="18082257" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e49cf5e5-98fe-40dc-bef3-4d6500f172ee/audio/7eec7383-a7a8-494e-bab2-aa6bc8404174/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Atlassian License Sales: Benefits of engaging an Atlassian Platinum Partner</itunes:title>
      <itunes:author>Atlassian, Contegix, Carahsoft</itunes:author>
      <itunes:duration>00:18:51</itunes:duration>
      <itunes:summary>In this podcast Mick Flanigan, Senior Director of Professional Services, for Contegix covers Atlassian license purchasing options, how to choose a reseller, working with a solutions partner, and so much more. Tune in for an insight into the benefits of buying through a solution partner versus alternative options!</itunes:summary>
      <itunes:subtitle>In this podcast Mick Flanigan, Senior Director of Professional Services, for Contegix covers Atlassian license purchasing options, how to choose a reseller, working with a solutions partner, and so much more. Tune in for an insight into the benefits of buying through a solution partner versus alternative options!</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fdbe6409-455f-41ec-92e8-b5b0c98c325e</guid>
      <title>Work From Home with Nutanix</title>
      <description><![CDATA[Listen to Phil Ditzel, Sales Specialist at Nutanix discuss how to implement a work from home environment in a timely, effective, and secure manner with Nutanix's desktop as a service (DaaS), Xi Frame. 
]]></description>
      <pubDate>Fri, 11 Dec 2020 16:22:36 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/work-from-home-with-nutanix-pLnUE9kv</link>
      <enclosure length="15932049" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/4e55f527-c2ea-40c2-9b17-3a3083a153c4/audio/0a32d4ef-9bf4-41d6-892e-69c89ea5a360/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Work From Home with Nutanix</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:16:35</itunes:duration>
      <itunes:summary>Listen to Phil Ditzel, Sales Specialist at Nutanix discuss how to implement a work from home environment in a timely, effective, and secure manner with Nutanix&apos;s desktop as a service (DaaS), Xi Frame.</itunes:summary>
      <itunes:subtitle>Listen to Phil Ditzel, Sales Specialist at Nutanix discuss how to implement a work from home environment in a timely, effective, and secure manner with Nutanix&apos;s desktop as a service (DaaS), Xi Frame.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d2c4c75c-6984-4dce-a325-8c7ee52f29cb</guid>
      <title>Work From Anywhere with Nutanix</title>
      <description><![CDATA[Listen to this podcast to learn how you can instantly implement a work from anywhere environment in a secure manner through Nutanix’s desktop as a service (DaaS) solution, Xi Frame. 
]]></description>
      <pubDate>Fri, 4 Dec 2020 22:05:58 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/work-from-anywhere-with-nutanix-5FnV_CN6</link>
      <enclosure length="17554553" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/edf8c122-d644-4652-b217-0a7ec0f523ce/audio/27bdb3c8-7513-4cb3-9332-ab2a1665703e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Work From Anywhere with Nutanix</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:18:07</itunes:duration>
      <itunes:summary>Listen to this podcast to learn how you can instantly implement a work from anywhere environment in a secure manner through Nutanix’s desktop as a service (DaaS) solution, Xi Frame.</itunes:summary>
      <itunes:subtitle>Listen to this podcast to learn how you can instantly implement a work from anywhere environment in a secure manner through Nutanix’s desktop as a service (DaaS) solution, Xi Frame.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ea968ad5-4e3c-4f69-ace5-b15919cd9f91</guid>
      <title>Modern Artificial Intelligence Strategy: An In-Depth Conversation with Pure Storage</title>
      <description><![CDATA[Join thought leaders from NVIDIA, Pure Storage, and SFL Scientific as we discuss the foundations necessary in the formulation of an Artificial Intelligence Strategy in Government Operations. 
]]></description>
      <pubDate>Tue, 1 Dec 2020 19:15:17 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (SFL Scientific, Carahsoft, Pure Storage, NVIDIA)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modern-artificial-intelligence-strategy-an-in-depth-conversation-with-pure-storage-Kx1xskTY</link>
      <enclosure length="51050737" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/2ee61614-e2a5-4278-8ad8-2defba191275/audio/557ced98-a2e7-4077-b9cf-dd4b60daf8a8/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modern Artificial Intelligence Strategy: An In-Depth Conversation with Pure Storage</itunes:title>
      <itunes:author>SFL Scientific, Carahsoft, Pure Storage, NVIDIA</itunes:author>
      <itunes:duration>00:53:00</itunes:duration>
      <itunes:summary>Join thought leaders from NVIDIA, Pure Storage, and SFL Scientific as we discuss the foundations necessary in the formulation of an Artificial Intelligence Strategy in Government Operations.</itunes:summary>
      <itunes:subtitle>Join thought leaders from NVIDIA, Pure Storage, and SFL Scientific as we discuss the foundations necessary in the formulation of an Artificial Intelligence Strategy in Government Operations.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40b1d9bf-9466-4767-8578-59139479b420</guid>
      <title>A Holistic People-Centric Approach to Insider Threat Management</title>
      <description><![CDATA[Tune into our podcast, A Holistic People-Centric Approach to Insider Threat Management, to discover how the ObserveIT platform helps agencies protect against data loss, malicious acts, and brand damage. 
]]></description>
      <pubDate>Fri, 20 Nov 2020 14:28:11 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Proofpoint)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/a-holistic-people-centric-approach-to-insider-threat-management-wGdjkWZE</link>
      <enclosure length="19275684" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/31eff2db-fc49-4484-9d14-acddb89391e8/audio/e823ff0d-1603-4edd-9cdd-300db4d7a2fd/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>A Holistic People-Centric Approach to Insider Threat Management</itunes:title>
      <itunes:author>Carahsoft, Proofpoint</itunes:author>
      <itunes:duration>00:20:02</itunes:duration>
      <itunes:summary>Tune into our podcast, A Holistic People-Centric Approach to Insider Threat Management, to discover how the ObserveIT platform helps agencies protect against data loss, malicious acts, and brand damage.</itunes:summary>
      <itunes:subtitle>Tune into our podcast, A Holistic People-Centric Approach to Insider Threat Management, to discover how the ObserveIT platform helps agencies protect against data loss, malicious acts, and brand damage.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e9ae08f4-fbec-4190-96bd-8110c9747937</guid>
      <title>Eliminating Standalone NAS Silos with Nutanix Files</title>
      <description><![CDATA[In this podcast, Jeremy Adair, Sr. Systems Engineer, discuss how Nutanix’s software-defined scale-out file storage solution, Files, designed to address a wide range of use cases. 
]]></description>
      <pubDate>Wed, 18 Nov 2020 15:13:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Nutanix)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/eliminating-standalone-nas-silos-with-nutanix-files-XbTzjJ5O</link>
      <enclosure length="15080359" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/9592b8a3-0a88-4bc0-ac9c-99507b75ee5b/audio/8fe1538d-beb1-4815-992e-19dc05994c17/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Eliminating Standalone NAS Silos with Nutanix Files</itunes:title>
      <itunes:author>Carahsoft, Nutanix</itunes:author>
      <itunes:duration>00:15:39</itunes:duration>
      <itunes:summary>In this podcast, Jeremy Adair, Sr. Systems Engineer, discuss how Nutanix’s software-defined scale-out file storage solution, Files, designed to address a wide range of use cases.</itunes:summary>
      <itunes:subtitle>In this podcast, Jeremy Adair, Sr. Systems Engineer, discuss how Nutanix’s software-defined scale-out file storage solution, Files, designed to address a wide range of use cases.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">43f3c39c-3caf-440c-804f-e21ac73fa770</guid>
      <title>One-Click Database Operations with Nutanix Era</title>
      <description><![CDATA[In this podcast, Roger Gibson, Systems Architect and John Weidenhammer, Systems Engineer from Nutanix will discuss how Nutanix Era automates and simplifies database management. 
]]></description>
      <pubDate>Wed, 11 Nov 2020 15:09:29 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/one-click-database-operations-with-nutanix-era-kM_enYwC</link>
      <enclosure length="20549658" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/22d987af-6582-4a71-9e71-e0ecdb2a360f/audio/6ff1814e-644c-48b9-af71-6d826097077e/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>One-Click Database Operations with Nutanix Era</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:21:22</itunes:duration>
      <itunes:summary>In this podcast, Roger Gibson, Systems Architect and John Weidenhammer, Systems Engineer from Nutanix will discuss how Nutanix Era automates and simplifies database management.</itunes:summary>
      <itunes:subtitle>In this podcast, Roger Gibson, Systems Architect and John Weidenhammer, Systems Engineer from Nutanix will discuss how Nutanix Era automates and simplifies database management.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9884d54c-cb75-4d08-ae8a-09bad644359f</guid>
      <title>Modernizing Web Experiences For the Navy: How Liferay Boosts Site Performance</title>
      <description><![CDATA[In this podcast, Chris Robertson, Chief Software Engineer, IBR discusses the advantages of using Liferay to deliver a one-stop shop for Navy career management. 
]]></description>
      <pubDate>Tue, 10 Nov 2020 16:50:29 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Liferay, IBR, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/modernizing-web-experiences-for-the-navy-how-liferay-boosts-web-performance-_9paBRot</link>
      <enclosure length="11771200" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/ac69d406-6af2-4be8-a31a-69fc7129adf3/audio/87908b2a-8397-4820-aa8e-bbe19b9190bc/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Modernizing Web Experiences For the Navy: How Liferay Boosts Site Performance</itunes:title>
      <itunes:author>Liferay, IBR, Carahsoft</itunes:author>
      <itunes:duration>00:12:14</itunes:duration>
      <itunes:summary>In this podcast, Chris Robertson, Chief Software Engineer, IBR discusses the advantages of using Liferay to deliver a one-stop shop for Navy career management.</itunes:summary>
      <itunes:subtitle>In this podcast, Chris Robertson, Chief Software Engineer, IBR discusses the advantages of using Liferay to deliver a one-stop shop for Navy career management.</itunes:subtitle>
      <itunes:keywords>navy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">24c5cec0-db26-423c-812c-8028a5b5d0c9</guid>
      <title>Meeting Modern Healthcare Needs with Mobility Management with VMware</title>
      <description><![CDATA[Mobile Integrate has extensive experience with integrating the VMWare Workspace ONE portfolio into healthcare environments, including identity management for an easy single sign-on (SSO) experience and lifecycle management to ensure the clinicians have the correct device with the info they need while keeping personally identifiable information (PII) secure. Mobile Integrate has also completed successful patient engagement workflows leveraging VMware Workspace ONE so patents can stay engaged with their treatment and communicate with members of their care team, friends, and family members. 
]]></description>
      <pubDate>Mon, 9 Nov 2020 18:32:29 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, VMware)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/meeting-modern-healthcare-needs-with-mobility-management-with-vmware-6SJXWnw5</link>
      <enclosure length="34433429" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/0243bc9e-3a0c-4552-9ff6-121a55aa914f/audio/4b778344-a696-4ca8-be8e-4e93d717a700/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Meeting Modern Healthcare Needs with Mobility Management with VMware</itunes:title>
      <itunes:author>Carahsoft, VMware</itunes:author>
      <itunes:duration>00:35:48</itunes:duration>
      <itunes:summary>Mobile Integrate has extensive experience with integrating the VMWare Workspace ONE portfolio into healthcare environments, including identity management for an easy single sign-on (SSO) experience and lifecycle management to ensure the clinicians have the correct device with the info they need while keeping personally identifiable information (PII) secure. Mobile Integrate has also completed successful patient engagement workflows leveraging VMware Workspace ONE so patents can stay engaged with their treatment and communicate with members of their care team, friends, and family members.</itunes:summary>
      <itunes:subtitle>Mobile Integrate has extensive experience with integrating the VMWare Workspace ONE portfolio into healthcare environments, including identity management for an easy single sign-on (SSO) experience and lifecycle management to ensure the clinicians have the correct device with the info they need while keeping personally identifiable information (PII) secure. Mobile Integrate has also completed successful patient engagement workflows leveraging VMware Workspace ONE so patents can stay engaged with their treatment and communicate with members of their care team, friends, and family members.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c9db533-fd63-4848-80aa-5eae8dfabc34</guid>
      <title>The New Normal: Delivering Applications to Students and Staff on Their Own Devices with AWS</title>
      <description><![CDATA[After government and educational institutions made heroic leaps to move virtual this year, how can you modernize, manage, and scale up and down these services cost-effectively? 
]]></description>
      <pubDate>Mon, 9 Nov 2020 18:28:30 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, Amazon Web Services, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-new-normal-delivering-applications-to-students-and-staff-on-their-own-devices-with-aws-GKRbXNTB</link>
      <enclosure length="40885465" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/2909a74a-afe2-453c-a04b-64127a2eee18/audio/59efe353-2616-4f63-b585-c3fece896fb7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The New Normal: Delivering Applications to Students and Staff on Their Own Devices with AWS</itunes:title>
      <itunes:author>AWS, Amazon Web Services, Carahsoft</itunes:author>
      <itunes:duration>00:42:31</itunes:duration>
      <itunes:summary>After government and educational institutions made heroic leaps to move virtual this year, how can you modernize, manage, and scale up and down these services cost-effectively?</itunes:summary>
      <itunes:subtitle>After government and educational institutions made heroic leaps to move virtual this year, how can you modernize, manage, and scale up and down these services cost-effectively?</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e28bfa9e-a3a3-4a4a-80e0-d218a0d4792a</guid>
      <title>How the Cloud Modernizes and Simplifies Elections with AWS</title>
      <description><![CDATA[Elections are among the most important administrative processes underlying our democracy, and they face an array of sophisticated threats designed to undermine system integrity and public trust. With AWS, election administrators and political campaigns are empowered to focus on the core needs of the electorate in a secure, scalable, and cost-effective way rather than building and maintaining the underlying infrastructure to support mission-critical efforts. 
]]></description>
      <pubDate>Mon, 9 Nov 2020 18:16:57 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, Amazon Web Services, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-the-cloud-modernizes-and-simplifies-elections-with-aws-HqT54j9R</link>
      <enclosure length="33660623" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/36a16fe6-090e-4d7c-8e86-01e6537c5aac/audio/bba9371a-cc9e-4e3f-b8e1-c8159d4d36f6/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How the Cloud Modernizes and Simplifies Elections with AWS</itunes:title>
      <itunes:author>AWS, Amazon Web Services, Carahsoft</itunes:author>
      <itunes:duration>00:35:00</itunes:duration>
      <itunes:summary>Elections are among the most important administrative processes underlying our democracy, and they face an array of sophisticated threats designed to undermine system integrity and public trust. With AWS, election administrators and political campaigns are empowered to focus on the core needs of the electorate in a secure, scalable, and cost-effective way rather than building and maintaining the underlying infrastructure to support mission-critical efforts.</itunes:summary>
      <itunes:subtitle>Elections are among the most important administrative processes underlying our democracy, and they face an array of sophisticated threats designed to undermine system integrity and public trust. With AWS, election administrators and political campaigns are empowered to focus on the core needs of the electorate in a secure, scalable, and cost-effective way rather than building and maintaining the underlying infrastructure to support mission-critical efforts.</itunes:subtitle>
      <itunes:keywords>election</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0c0c77f1-e99b-48e3-845d-d46e7db2859c</guid>
      <title>Unify Your Private Cloud &amp; AWS with Nutanix Clusters</title>
      <description><![CDATA[In Carahsoft’s new podcast, Kelly Estes, Systems Engineer at Nutanix discuss how Nutanix Clusters on AWS enables single infrastructure management plane across all clouds, app migration across clouds with no code changes needed, and license portability cost optimization features with maximize investment. 
]]></description>
      <pubDate>Wed, 4 Nov 2020 22:24:09 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Nutanix, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/unify-your-private-cloud-aws-with-nutanix-clusters-ZiNt1pDe</link>
      <enclosure length="14016830" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e87f0a0b-806f-4275-be91-b15aa51cb63c/audio/50732172-28e8-4a52-a51d-328e201a0c63/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Unify Your Private Cloud &amp; AWS with Nutanix Clusters</itunes:title>
      <itunes:author>Nutanix, Carahsoft</itunes:author>
      <itunes:duration>00:14:34</itunes:duration>
      <itunes:summary>In Carahsoft’s new podcast, Kelly Estes, Systems Engineer at Nutanix discuss how Nutanix Clusters on AWS enables single infrastructure management plane across all clouds, app migration across clouds with no code changes needed, and license portability cost optimization features with maximize investment.</itunes:summary>
      <itunes:subtitle>In Carahsoft’s new podcast, Kelly Estes, Systems Engineer at Nutanix discuss how Nutanix Clusters on AWS enables single infrastructure management plane across all clouds, app migration across clouds with no code changes needed, and license portability cost optimization features with maximize investment.</itunes:subtitle>
      <itunes:keywords>nutanix era</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9464027b-56cc-40e2-bc89-107a96ccf299</guid>
      <title>Processing Data in the Field with Red Hat</title>
      <description><![CDATA[In Red Hat’s new podcast, Ryan Kraus, Staff Data Science Solutions Architect at Red Hat, discusses trends in edge computing across the public sector and Red Hat’s collaborative AI-driven solution that enables high performance data processing in the field. 
]]></description>
      <pubDate>Mon, 26 Oct 2020 20:02:54 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Red Hat, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/processing-data-in-the-field-with-red-hat-e0UyGag3</link>
      <enclosure length="12795132" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/e66a7df7-6157-40d5-89e4-04cbd88610c2/audio/446d2181-2c05-4602-8bc7-b7322f7ee071/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Processing Data in the Field with Red Hat</itunes:title>
      <itunes:author>Red Hat, Carahsoft</itunes:author>
      <itunes:duration>00:13:18</itunes:duration>
      <itunes:summary>In Red Hat’s new podcast, Ryan Kraus, Staff Data Science Solutions Architect at Red Hat, discusses trends in edge computing across the public sector and Red Hat’s collaborative AI-driven solution that enables high performance data processing in the field.</itunes:summary>
      <itunes:subtitle>In Red Hat’s new podcast, Ryan Kraus, Staff Data Science Solutions Architect at Red Hat, discusses trends in edge computing across the public sector and Red Hat’s collaborative AI-driven solution that enables high performance data processing in the field.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">af7518d7-df27-4095-8572-d6c37a8cc05d</guid>
      <title>An Agile Approach with Atlassian</title>
      <description><![CDATA[
Agile transformation is a journey, not a destination. The need for an agile transformation is becoming more critical to cope with the rapidly changing, ambiguous and volatile world we work in. Agile mentoring can help your organization become more dynamic, cross functional and successful than ever before. 
In Atlassian's new podcast, John Turley, Innovator for Adaptavist, explains the value of an autonomous and cross functional working environment. He goes on to discuss how Agile mentoring adds the necessary components that methodology and technology often lack.  
]]></description>
      <pubDate>Fri, 16 Oct 2020 13:55:58 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Adaptavist, Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/an-agile-approach-with-atlassian-5hYb2DPO</link>
      <enclosure length="16412096" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/3377ca1b-1940-4ece-a473-6d47fdb28494/audio/1648a477-535e-4bf1-8602-e6cb76515bb0/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>An Agile Approach with Atlassian</itunes:title>
      <itunes:author>Adaptavist, Atlassian, Carahsoft</itunes:author>
      <itunes:duration>00:17:06</itunes:duration>
      <itunes:summary>
Agile transformation is a journey, not a destination. The need for an agile transformation is becoming more critical to cope with the rapidly changing, ambiguous and volatile world we work in. Agile mentoring can help your organization become more dynamic, cross functional and successful than ever before. 
In Atlassian&apos;s new podcast, John Turley, Innovator for Adaptavist, explains the value of an autonomous and cross functional working environment. He goes on to discuss how Agile mentoring adds the necessary components that methodology and technology often lack. </itunes:summary>
      <itunes:subtitle>
Agile transformation is a journey, not a destination. The need for an agile transformation is becoming more critical to cope with the rapidly changing, ambiguous and volatile world we work in. Agile mentoring can help your organization become more dynamic, cross functional and successful than ever before. 
In Atlassian&apos;s new podcast, John Turley, Innovator for Adaptavist, explains the value of an autonomous and cross functional working environment. He goes on to discuss how Agile mentoring adds the necessary components that methodology and technology often lack. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0110bc07-2676-4ca9-9c31-a7f001cb35af</guid>
      <title>Rethink Your Approach to Cybersecurity with Proofpoint</title>
      <description><![CDATA[Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it's crucial to understand the data your users have access to and how they are handling that sensitive information.

With over 90% of attacks originating from email and countless breaches caused by human error, it's important to engage your end-users and create a culture of security awareness. Now is the time to gain visibility and understanding of your greatest security risk: your people. 
]]></description>
      <pubDate>Mon, 12 Oct 2020 20:41:55 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Proofpoint)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/rethink-your-approach-to-cybersecurity-with-proofpoint-7grOePXv</link>
      <enclosure length="18498697" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/d19e7024-50b8-4a9c-9466-73054687c2a0/audio/0b0e15f1-58d8-409d-a6d4-22a330672fa7/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Rethink Your Approach to Cybersecurity with Proofpoint</itunes:title>
      <itunes:author>Carahsoft, Proofpoint</itunes:author>
      <itunes:duration>00:19:14</itunes:duration>
      <itunes:summary>Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it&apos;s crucial to understand the data your users have access to and how they are handling that sensitive information.

With over 90% of attacks originating from email and countless breaches caused by human error, it&apos;s important to engage your end-users and create a culture of security awareness. Now is the time to gain visibility and understanding of your greatest security risk: your people.</itunes:summary>
      <itunes:subtitle>Federal departments and agencies employ millions of personnel to carry out the missions and functions that the American public relies on for its well-being. The IT systems and networks of the Federal government continue to be attractive targets for foreign intelligence services and other malicious actors. As the threat landscape changes and attacks become more human-targeted, it&apos;s crucial to understand the data your users have access to and how they are handling that sensitive information.

With over 90% of attacks originating from email and countless breaches caused by human error, it&apos;s important to engage your end-users and create a culture of security awareness. Now is the time to gain visibility and understanding of your greatest security risk: your people.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2907ff5d-3048-47b8-91a1-082272291861</guid>
      <title>Will Remote Schooling Be Safe? with McAfee</title>
      <description><![CDATA[In this podcast, McAfee Security Engineer, Chris Moran, and e.Republic Vice President of Research, Joe Morris, discuss how McAfee MVISION Mobile Advanced can protect your remote teachers and students. 
]]></description>
      <pubDate>Mon, 28 Sep 2020 15:09:40 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (McAfee, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/will-remote-schooling-be-safe-with-mcafee-i6YtZLjM</link>
      <enclosure length="33741938" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/episodes/947bdffd-c83b-429c-aa80-0f7bf69c6d78/audio/6d3e1f1f-d4c7-4c01-8d34-254e79a47089/default_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Will Remote Schooling Be Safe? with McAfee</itunes:title>
      <itunes:author>McAfee, Carahsoft</itunes:author>
      <itunes:duration>00:35:09</itunes:duration>
      <itunes:summary>In this podcast, McAfee Security Engineer, Chris Moran, and e.Republic Vice President of Research, Joe Morris, discuss how McAfee MVISION Mobile Advanced can protect your remote teachers and students.</itunes:summary>
      <itunes:subtitle>In this podcast, McAfee Security Engineer, Chris Moran, and e.Republic Vice President of Research, Joe Morris, discuss how McAfee MVISION Mobile Advanced can protect your remote teachers and students.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b02eb42f-871f-4fb6-893c-dfda42a8cdda</guid>
      <title>The Evolution of How Cybersecurity is Delivered as a Shared Service</title>
      <description><![CDATA[In this podcast, you will hear a chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) & Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies. 
]]></description>
      <pubDate>Tue, 15 Sep 2020 17:29:44 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Palo Alto, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-evolution-of-how-cybersecurity-is-delivered-as-a-shared-service-1eLPn2S5</link>
      <enclosure length="52876528" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/801eb67f-05ec-4a11-a453-e03fb236b0c1/palo-alto-first-draft-1_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Evolution of How Cybersecurity is Delivered as a Shared Service</itunes:title>
      <itunes:author>Palo Alto, Carahsoft</itunes:author>
      <itunes:duration>00:55:05</itunes:duration>
      <itunes:summary>In this podcast, you will hear a chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) &amp; Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies.</itunes:summary>
      <itunes:subtitle>In this podcast, you will hear a chat with Matt Brown, CEO of Shorepoint, and Rob Palmer, EVP and CTO of Shorepoint, to discuss what impact the first Quality Services Management Office (QSMO) Shared Service offering from The Office of Management and Budget (OMB) &amp; Cybersecurity and Infrastructure Security Agency (CISA) will have on Federal agencies.</itunes:subtitle>
      <itunes:keywords>carahsoft, palo alto</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">528a54c8-5ac4-4b1f-9948-c94b1412f874</guid>
      <title>Enterprising Network Automation with Red Hat</title>
      <description><![CDATA[In Carahsoft’s new podcast, Mike Garris, Solutions Architect at Red Hat, discusses the rapid adoption of Red Hat Ansible for network automation across federal government agencies and how your team can modernize and streamline operations with Red Hat’s tool for enterprise IT automation. 
]]></description>
      <pubDate>Wed, 26 Aug 2020 15:32:10 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Red Hat, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/enterprising-network-automation-with-red-hat-_qU2h4_s</link>
      <enclosure length="7506986" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/8e4a5397-a19e-42a2-8b6d-afd17597c570/enterprising-network-automation-final_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Enterprising Network Automation with Red Hat</itunes:title>
      <itunes:author>Red Hat, Carahsoft</itunes:author>
      <itunes:duration>00:07:46</itunes:duration>
      <itunes:summary>In Carahsoft’s new podcast, Mike Garris, Solutions Architect at Red Hat, discusses the rapid adoption of Red Hat Ansible for network automation across federal government agencies and how your team can modernize and streamline operations with Red Hat’s tool for enterprise IT automation.</itunes:summary>
      <itunes:subtitle>In Carahsoft’s new podcast, Mike Garris, Solutions Architect at Red Hat, discusses the rapid adoption of Red Hat Ansible for network automation across federal government agencies and how your team can modernize and streamline operations with Red Hat’s tool for enterprise IT automation.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e097aa24-3033-4c29-9e1c-a45af5bd1686</guid>
      <title>Transitioning to Civilian Life: How the Army is Using Liferay Digital Experience Platform (DXP)</title>
      <description><![CDATA[In today's rapidly changing world, the skills of U.S. soldiers and veterans needed to thrive after their service ends is ever evolving. With only 50% of U.S. veterans saying that they have the skills to prepare them for the transition to civilian life, the Army was faced with the critical task of building a digital platform to support training and education opportunities for soldiers and veterans. The Army chose Liferay as the modern digital experience platform for its flexibility and mobile solution architecture.  
]]></description>
      <pubDate>Wed, 26 Aug 2020 15:28:51 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Liferay, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/transitioning-to-civilian-life-how-the-army-is-using-liferay-digital-experience-platform-dxp-Dsn9IIoi</link>
      <enclosure length="12447055" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/9c35ba3b-5051-49db-b328-ccdc6f9264a8/liferay-x-deloitte-podcast-final_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Transitioning to Civilian Life: How the Army is Using Liferay Digital Experience Platform (DXP)</itunes:title>
      <itunes:author>Liferay, Carahsoft</itunes:author>
      <itunes:duration>00:12:54</itunes:duration>
      <itunes:summary>In today&apos;s rapidly changing world, the skills of U.S. soldiers and veterans needed to thrive after their service ends is ever evolving. With only 50% of U.S. veterans saying that they have the skills to prepare them for the transition to civilian life, the Army was faced with the critical task of building a digital platform to support training and education opportunities for soldiers and veterans. The Army chose Liferay as the modern digital experience platform for its flexibility and mobile solution architecture. </itunes:summary>
      <itunes:subtitle>In today&apos;s rapidly changing world, the skills of U.S. soldiers and veterans needed to thrive after their service ends is ever evolving. With only 50% of U.S. veterans saying that they have the skills to prepare them for the transition to civilian life, the Army was faced with the critical task of building a digital platform to support training and education opportunities for soldiers and veterans. The Army chose Liferay as the modern digital experience platform for its flexibility and mobile solution architecture. </itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7018aa53-7719-4e76-b7af-b1e4d2a211ae</guid>
      <title>Protecting Government and Corporate Supply Chains Against Key Cyber Threats at Scale with IronNet &amp; AWS</title>
      <description><![CDATA[Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it’s changing how businesses and the federal government protect their supply chains. 
]]></description>
      <pubDate>Wed, 19 Aug 2020 15:31:39 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, IronNet, AWS)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/protecting-government-and-corporate-supply-chains-against-key-cyber-threats-at-scale-with-ironnet-aws-jCjLS2IH</link>
      <enclosure length="36173625" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/ba344bd4-5f48-4594-8311-c18a7b0052fa/protecting-government-supply-chains-mixdown_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Protecting Government and Corporate Supply Chains Against Key Cyber Threats at Scale with IronNet &amp; AWS</itunes:title>
      <itunes:author>Carahsoft, IronNet, AWS</itunes:author>
      <itunes:duration>00:37:41</itunes:duration>
      <itunes:summary>Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it’s changing how businesses and the federal government protect their supply chains.</itunes:summary>
      <itunes:subtitle>Supply chain complexity is rising, and the public and private sectors are stronger together. The resulting approach is called cyber collective defense, and it’s changing how businesses and the federal government protect their supply chains.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">98223d66-f6ed-41ce-8dec-84036b9ccf89</guid>
      <title>Collective Defense and the Global Cyber Threat Environment with IronNet &amp; AWS</title>
      <description><![CDATA[Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems. 
]]></description>
      <pubDate>Wed, 19 Aug 2020 14:42:15 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (AWS, IronNet, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/collective-defense-and-the-global-cyber-threat-environment-with-ironnet-aws-KRJJpyt_</link>
      <enclosure length="39975525" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/fa5afd31-9622-41da-bd62-8e7c620d333e/collective-defense-and-the-global-cyber-threat-environment-final-version_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Collective Defense and the Global Cyber Threat Environment with IronNet &amp; AWS</itunes:title>
      <itunes:author>AWS, IronNet, Carahsoft</itunes:author>
      <itunes:duration>00:41:34</itunes:duration>
      <itunes:summary>Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.</itunes:summary>
      <itunes:subtitle>Recent years have shown a massive expansion of the global cyber attack surface. The proliferation of IoT and smart devices plus the speed and scale of communications have created an environment that makes it easier for adversaries to exploit vulnerabilities in federal systems.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0df1b5bb-4960-4a1a-9a82-9ac42a1c4934</guid>
      <title>3 Best Practices that Enable Exceptional Citizen Engagement with ServiceNow</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 18 Aug 2020 19:54:54 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, SerivceNow)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/3-best-practices-that-enable-exceptional-citizen-engagement-with-servicenow-ccQDAt6G</link>
      <enclosure length="2585584" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/6bd29cf6-07c9-441a-9a76-672824738d83/cxs-podcast-nitin-badjatia-with-servicenow-no-blurb_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>3 Best Practices that Enable Exceptional Citizen Engagement with ServiceNow</itunes:title>
      <itunes:author>Carahsoft, SerivceNow</itunes:author>
      <itunes:duration>00:02:42</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b5bdff1a-1b5f-47ad-a5d7-60e07aa73111</guid>
      <title>How Governments Can Meet Citizens on Their Terms with Okta</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 18 Aug 2020 19:46:14 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Okta)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-governments-can-meet-citizens-on-their-terms-with-okta-bg7UHa6U</link>
      <enclosure length="1207155" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/56f4c41c-e560-4b66-8738-fbafc7191873/cxs-podcast-habib-hourani-with-okta-no-blurb_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How Governments Can Meet Citizens on Their Terms with Okta</itunes:title>
      <itunes:author>Carahsoft, Okta</itunes:author>
      <itunes:duration>00:01:15</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8aa57598-8348-41c3-b81b-8f605d3c1e2e</guid>
      <title>The Paperless Government Mission with DocuSign</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 18 Aug 2020 19:44:15 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (DocuSign, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-paperless-government-mission-with-docusign-ULySL0gG</link>
      <enclosure length="2721839" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/5805916d-5879-49b1-ba4e-cf150d1365dd/cxs-podcast-carrie-anne-mosley-with-docusign-no-blurb_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Paperless Government Mission with DocuSign</itunes:title>
      <itunes:author>DocuSign, Carahsoft</itunes:author>
      <itunes:duration>00:02:50</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e93ac41-0302-43c3-9da6-42e809c69c49</guid>
      <title>The Citizen Experience On Social Media with Hootsuite</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 18 Aug 2020 19:41:43 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Hootsuite)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-citizen-experience-on-social-media-with-hootsuite-12rlMoc2</link>
      <enclosure length="2162191" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/a706afde-7b83-48fa-a818-b4399d35eaa7/cxs-podcast-ben-cathers-from-hootsuite-no-blurb_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Citizen Experience On Social Media with Hootsuite</itunes:title>
      <itunes:author>Carahsoft, Hootsuite</itunes:author>
      <itunes:duration>00:02:15</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a9cb772d-ed3b-425e-a527-0e9c3c09965f</guid>
      <title>Turn Critical Surge in Demand to Broader Digital Transformation Effort with Granicus</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 18 Aug 2020 19:40:20 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Granicus, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/turn-critical-surge-in-demand-to-broader-digital-transformation-effort-with-granicus-Niir0jR0</link>
      <enclosure length="2295938" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/fe288424-1368-4119-b0a8-0a488ed46d19/cxs-podcast-angy-peterson-with-granicus-no-blurb_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Turn Critical Surge in Demand to Broader Digital Transformation Effort with Granicus</itunes:title>
      <itunes:author>Granicus, Carahsoft</itunes:author>
      <itunes:duration>00:02:23</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">838c93b1-0c2c-4bcd-82a9-4e4a0c288e22</guid>
      <title>Meet Citizens Where They Are with Salesforce</title>
      <description><![CDATA[ 
]]></description>
      <pubDate>Tue, 18 Aug 2020 19:38:40 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Salesforce, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/meet-citizens-where-they-are-with-salesforce-ORSqNtQp</link>
      <enclosure length="2187269" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/e6d860fb-5395-4c7a-b007-34ce93969918/cxs-podast-matt-goodrich-with-salesforce-no-blurb_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Meet Citizens Where They Are with Salesforce</itunes:title>
      <itunes:author>Salesforce, Carahsoft</itunes:author>
      <itunes:duration>00:02:17</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dcad66d2-2c47-486b-b5b7-1de594982650</guid>
      <title>The Value of a Subscription with Red Hat</title>
      <description><![CDATA[Adam Clater, Chief Architect, North America Public Sector at Red Hat, discusses the value of a Red Hat subscription and Red Hat’s process for refining open source innovation into stable, secure solutions for your state and local agency or academic institution's production environments. 
]]></description>
      <pubDate>Tue, 28 Jul 2020 19:00:25 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Red Hat, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-value-of-a-subscription-with-red-hat-tF7dpQD1</link>
      <enclosure length="19778226" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/ceea5637-cf8a-4f5e-ba19-eec56e31025c/value-of-a-red-hat-subscription-final_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Value of a Subscription with Red Hat</itunes:title>
      <itunes:author>Red Hat, Carahsoft</itunes:author>
      <itunes:duration>00:20:30</itunes:duration>
      <itunes:summary>Adam Clater, Chief Architect, North America Public Sector at Red Hat, discusses the value of a Red Hat subscription and Red Hat’s process for refining open source innovation into stable, secure solutions for your state and local agency or academic institution&apos;s production environments.</itunes:summary>
      <itunes:subtitle>Adam Clater, Chief Architect, North America Public Sector at Red Hat, discusses the value of a Red Hat subscription and Red Hat’s process for refining open source innovation into stable, secure solutions for your state and local agency or academic institution&apos;s production environments.</itunes:subtitle>
      <itunes:keywords>red hat, carahsoft</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">580f4254-ae62-4fb5-9e6e-7082fe7cd931</guid>
      <title>Hosting in the Cloud with Atlassian</title>
      <description><![CDATA[Listen to Amanda Babb, Principal Consultant for Praecipio Consulting, discuss the value that Cumulus Cloud, a comprehensive hosting solution, brings to your enterprise organization. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 19:27:36 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Praecipio, Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/hosting-in-the-cloud-with-atlassian-gK_FEEOb</link>
      <enclosure length="12013493" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/b20bac1a-a445-43d3-8e70-6e6255292e2d/atlassian-advantage-podcast-praecipio-consulting-with-amanda-babb-final-draft_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Hosting in the Cloud with Atlassian</itunes:title>
      <itunes:author>Praecipio, Atlassian, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/1c458e86-b496-489f-b623-8ce674cfacfa/3000x3000/amanda-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:31</itunes:duration>
      <itunes:summary>Listen to Amanda Babb, Principal Consultant for Praecipio Consulting, discuss the value that Cumulus Cloud, a comprehensive hosting solution, brings to your enterprise organization.</itunes:summary>
      <itunes:subtitle>Listen to Amanda Babb, Principal Consultant for Praecipio Consulting, discuss the value that Cumulus Cloud, a comprehensive hosting solution, brings to your enterprise organization.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, praecipio</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">04e76d90-1e8a-4243-9dae-ea2801efd63e</guid>
      <title>Making the Most Out of Your Atlassian Investment</title>
      <description><![CDATA[In this podcast, CEO and Co-Founder of Isos Technology, Thad West, shares the various services partners can provide whether it be consultative or technical. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 19:18:55 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Isos Technology, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/making-the-most-out-of-your-atlassian-investment-uc4Gi5Un</link>
      <enclosure length="8629267" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/aa1c07ce-926f-4723-acd5-a2a29dbb597e/mixdown-mp3_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Making the Most Out of Your Atlassian Investment</itunes:title>
      <itunes:author>Atlassian, Isos Technology, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/ab3c503b-5113-46d9-8075-89238fd1e6a8/3000x3000/thad-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:59</itunes:duration>
      <itunes:summary>In this podcast, CEO and Co-Founder of Isos Technology, Thad West, shares the various services partners can provide whether it be consultative or technical.</itunes:summary>
      <itunes:subtitle>In this podcast, CEO and Co-Founder of Isos Technology, Thad West, shares the various services partners can provide whether it be consultative or technical.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, isos technology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d02a5a0c-1b16-45a4-9b41-6f439a2e2ed6</guid>
      <title>The Future of Cyber Secure Schools</title>
      <description><![CDATA[Listen to Greg Herbold, Palo Alto Networks’ Director of State and Local and Education, discuss how to consistently tackle the top threats in K-12 schools in traditional and remote learning models. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 19:11:20 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Palo Alto)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/the-future-of-cyber-secure-schools-lESk09nW</link>
      <enclosure length="40445168" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/2b86dd76-0ad1-4e7f-84f2-5cc0238928c6/palo-alto-intro-2-mixdown-track-1_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>The Future of Cyber Secure Schools</itunes:title>
      <itunes:author>Carahsoft, Palo Alto</itunes:author>
      <itunes:duration>00:42:08</itunes:duration>
      <itunes:summary>Listen to Greg Herbold, Palo Alto Networks’ Director of State and Local and Education, discuss how to consistently tackle the top threats in K-12 schools in traditional and remote learning models.</itunes:summary>
      <itunes:subtitle>Listen to Greg Herbold, Palo Alto Networks’ Director of State and Local and Education, discuss how to consistently tackle the top threats in K-12 schools in traditional and remote learning models.</itunes:subtitle>
      <itunes:keywords>carahsoft, cyber secure schools, palo alto</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">31626425-c158-42c5-af03-005f2eb87431</guid>
      <title>Part 2: Staff and Stakeholder Relationship Management</title>
      <description><![CDATA[Listen to part 2 of our podcast with Justin Leader, CEO of HyperVelocity, to hear how to effectively modernize implementation of CRM modernization within your agency.  
]]></description>
      <pubDate>Fri, 17 Jul 2020 18:29:37 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (HyperVelocity, Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/part-2-staff-and-stakeholder-relationship-management-T4Q8ZVhT</link>
      <enclosure length="9111610" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/6973a359-8257-403f-90a8-be43cc5aae96/hypervelocity-podcast-part-2_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Part 2: Staff and Stakeholder Relationship Management</itunes:title>
      <itunes:author>HyperVelocity, Atlassian, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/34810577-081e-42ad-8425-0800c0efd212/3000x3000/justin-rss-part-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:30</itunes:duration>
      <itunes:summary>Listen to part 2 of our podcast with Justin Leader, CEO of HyperVelocity, to hear how to effectively modernize implementation of CRM modernization within your agency. </itunes:summary>
      <itunes:subtitle>Listen to part 2 of our podcast with Justin Leader, CEO of HyperVelocity, to hear how to effectively modernize implementation of CRM modernization within your agency. </itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, hypervelocity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1b4efad6-f717-4461-a4da-fc0d418763b8</guid>
      <title>Part 1: Staff and Stakeholder Relationship Management</title>
      <description><![CDATA[Listen to part 1 of our podcast with Justin Leader, CEO of HyperVelocity, an Atlassian Platinum Enterprise Solution Partner for helpful information on personnel onboarding and tracking customer relationships. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 18:19:51 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, HyperVelocity, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/part-1-staff-and-stakeholder-relationship-management-Rwxi5zTT</link>
      <enclosure length="10110107" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/113b1030-3f1e-4c72-9f39-f31b3968a8e3/hypervelocity-podcast-part-1_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Part 1: Staff and Stakeholder Relationship Management</itunes:title>
      <itunes:author>Atlassian, HyperVelocity, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/ae6df495-0d0b-4f7b-ba69-9e0daee598f0/3000x3000/justin-rss-part-1.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:32</itunes:duration>
      <itunes:summary>Listen to part 1 of our podcast with Justin Leader, CEO of HyperVelocity, an Atlassian Platinum Enterprise Solution Partner for helpful information on personnel onboarding and tracking customer relationships.</itunes:summary>
      <itunes:subtitle>Listen to part 1 of our podcast with Justin Leader, CEO of HyperVelocity, an Atlassian Platinum Enterprise Solution Partner for helpful information on personnel onboarding and tracking customer relationships.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, hypervelocity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b97f3fa-01c0-4d41-804b-a0f8442bdbec</guid>
      <title>Scaling DevSecOps Success with Red Hat</title>
      <description><![CDATA[Red Hat’s Transformation Specialist and DevOps Evangelist, Michael Ducy, discusses Red Hat's industry-leading enterprise open source tools for DevSecOps success. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 17:54:11 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Red Hat)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/scaling-devsecops-success-with-red-hat-fJ4cTCTy</link>
      <enclosure length="10405421" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/dfa9f5a7-4f33-46c3-9dd9-1239e8667627/red-hat-podcast-devsecops-with-michael-ducy-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Scaling DevSecOps Success with Red Hat</itunes:title>
      <itunes:author>Carahsoft, Red Hat</itunes:author>
      <itunes:duration>00:10:51</itunes:duration>
      <itunes:summary>Red Hat’s Transformation Specialist and DevOps Evangelist, Michael Ducy, discusses Red Hat&apos;s industry-leading enterprise open source tools for DevSecOps success.</itunes:summary>
      <itunes:subtitle>Red Hat’s Transformation Specialist and DevOps Evangelist, Michael Ducy, discusses Red Hat&apos;s industry-leading enterprise open source tools for DevSecOps success.</itunes:subtitle>
      <itunes:keywords>red hat, carahsoft, devsecops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c4df4c9d-a75d-4d49-8d3e-c7f3a608df5f</guid>
      <title>Atlassian Training with Dan Schillace</title>
      <description><![CDATA[Atlassian Solution Services Associate, Dan Schillace, shares the benefits that Atlassian training provides, including the 6 overall Certifications available to earn and share. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 17:45:21 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/atlassian-training-with-dan-schillace-qWR9xKD6</link>
      <enclosure length="9699253" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/a4ba9ca2-f1e1-4a4e-b90b-ef326c207eeb/atlassian-advantage-podcast-atlassian-training-with-dan-schillace-wave_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Atlassian Training with Dan Schillace</itunes:title>
      <itunes:author>Atlassian, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/1986ce6f-6d33-41f7-9c11-adf5ffc31d85/3000x3000/dan-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:10:07</itunes:duration>
      <itunes:summary>Atlassian Solution Services Associate, Dan Schillace, shares the benefits that Atlassian training provides, including the 6 overall Certifications available to earn and share.</itunes:summary>
      <itunes:subtitle>Atlassian Solution Services Associate, Dan Schillace, shares the benefits that Atlassian training provides, including the 6 overall Certifications available to earn and share.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, atlassian training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b5820c93-66d2-44f2-a3e6-f0eb951825fc</guid>
      <title>Addteq&apos;s Unstoppable App: Keep the World Working</title>
      <description><![CDATA[Atlassian Verified Government Partner Addteq shares how their Unstoppable app helps visually impaired users to have full control of Atlassian products such as Jira and Confluence. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 17:28:42 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Addteq, Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/addteqs-unstoppable-app-keep-the-world-working-IIfouO0e</link>
      <enclosure length="7280524" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/542031d4-8a0c-4200-b2b5-4af58046f690/atlassian-advantage-podcast-unstoppable-solution-with-addteq-complete-draft4-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Addteq&apos;s Unstoppable App: Keep the World Working</itunes:title>
      <itunes:author>Addteq, Carahsoft, Atlassian</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/1cd86799-6cfa-4cc1-93e9-f280d8cf86ea/3000x3000/nathan-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:36</itunes:duration>
      <itunes:summary>Atlassian Verified Government Partner Addteq shares how their Unstoppable app helps visually impaired users to have full control of Atlassian products such as Jira and Confluence.</itunes:summary>
      <itunes:subtitle>Atlassian Verified Government Partner Addteq shares how their Unstoppable app helps visually impaired users to have full control of Atlassian products such as Jira and Confluence.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, addteq</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b888a4ed-9001-4538-bc4a-ef2e0f6ff6c9</guid>
      <title>Enterprise Service Delivery with Atlassian</title>
      <description><![CDATA[Listen to Atlassian State and Local Channel Manager, Shayla Sander, talk about implementing enterprise service management and what it could mean for your agency. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 17:13:47 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/enterprise-service-delivery-with-atlassian-F738k5Lj</link>
      <enclosure length="8391041" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/f82552c7-9d62-4930-9f8b-edb5052089fc/atlassian-advantage-podcast-enterprise-service-delivery-with-shayla-sander-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Enterprise Service Delivery with Atlassian</itunes:title>
      <itunes:author>Carahsoft, Atlassian</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/ce6cfd5e-a7e4-4a9d-b65f-506680428e51/3000x3000/shayla-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:45</itunes:duration>
      <itunes:summary>Listen to Atlassian State and Local Channel Manager, Shayla Sander, talk about implementing enterprise service management and what it could mean for your agency.</itunes:summary>
      <itunes:subtitle>Listen to Atlassian State and Local Channel Manager, Shayla Sander, talk about implementing enterprise service management and what it could mean for your agency.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, enterprise service management, enterprise serive deliver</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e8329a8-2c68-49d4-8544-932c26432d17</guid>
      <title>Scaling Mission Critical Deployment with Atlassian</title>
      <description><![CDATA[Hear Apnatomy Co-Founder, Jason White, talk with Atlassian Sales Director, Sean O'Sullivan about how Apnatomy brings agile experience from private sector into the public sector. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 16:07:05 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Atlassian, Apnatomy)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/scaling-mission-critical-deployment-with-atlassian-3LGjFp_f</link>
      <enclosure length="8292177" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/4306bac0-0a6e-467c-ac77-74a06abb15fc/apnatomy-podcast-with-jason-white-phone-interview_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Scaling Mission Critical Deployment with Atlassian</itunes:title>
      <itunes:author>Carahsoft, Atlassian, Apnatomy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/fafb3460-b82a-4bbd-996d-61d4f1542984/3000x3000/jason-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:32</itunes:duration>
      <itunes:summary>Hear Apnatomy Co-Founder, Jason White, talk with Atlassian Sales Director, Sean O&apos;Sullivan about how Apnatomy brings agile experience from private sector into the public sector.</itunes:summary>
      <itunes:subtitle>Hear Apnatomy Co-Founder, Jason White, talk with Atlassian Sales Director, Sean O&apos;Sullivan about how Apnatomy brings agile experience from private sector into the public sector.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, apnatomy, mission critical deployment</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5591901a-984a-4748-9894-7ac5495c3861</guid>
      <title>Automation Made Easy with Red Hat</title>
      <description><![CDATA[Red Hat’s Cloud Domain Architect, Jason Ritenour, sits down with our Red Hat Sales Director, Rich Savage, to take a deeper dive into automation across the public sector. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 15:58:01 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Red Hat, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/automation-made-easy-with-red-hat-foy_zV_l</link>
      <enclosure length="12541356" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/3144c2e2-f9af-4d7d-ad15-23f0352d5820/redhat-2-3-20-final_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Automation Made Easy with Red Hat</itunes:title>
      <itunes:author>Red Hat, Carahsoft</itunes:author>
      <itunes:duration>00:12:55</itunes:duration>
      <itunes:summary>Red Hat’s Cloud Domain Architect, Jason Ritenour, sits down with our Red Hat Sales Director, Rich Savage, to take a deeper dive into automation across the public sector.</itunes:summary>
      <itunes:subtitle>Red Hat’s Cloud Domain Architect, Jason Ritenour, sits down with our Red Hat Sales Director, Rich Savage, to take a deeper dive into automation across the public sector.</itunes:subtitle>
      <itunes:keywords>red hat, carahsoft, automation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bf320192-3e9a-4503-9236-dad5733911f0</guid>
      <title>Federal 508 Compliance with Atlassian</title>
      <description><![CDATA[Addteq VP of Marketing, Jaclyn Mazzarella discusses with Atlassian Sales Director, Sean O'Sullivan, how Atlassian helps agencies comply with Section 508 of the Rehabilitation Act. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 15:48:42 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Addteq, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/federal-508-compliance-with-atlassian-OvPaTK4H</link>
      <enclosure length="14666231" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/581544a2-669f-43c9-8475-de10d923aff0/2019-12-addteq-podcast-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Federal 508 Compliance with Atlassian</itunes:title>
      <itunes:author>Atlassian, Addteq, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/c5d5c85a-e6b0-44e2-9d28-5efff3de7596/3000x3000/jaclyn-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:17</itunes:duration>
      <itunes:summary>Addteq VP of Marketing, Jaclyn Mazzarella discusses with Atlassian Sales Director, Sean O&apos;Sullivan, how Atlassian helps agencies comply with Section 508 of the Rehabilitation Act.</itunes:summary>
      <itunes:subtitle>Addteq VP of Marketing, Jaclyn Mazzarella discusses with Atlassian Sales Director, Sean O&apos;Sullivan, how Atlassian helps agencies comply with Section 508 of the Rehabilitation Act.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, addteq, federal 508, rehabilitation act</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4f5cd085-d3f2-4dac-97ab-18c7239fa789</guid>
      <title>How Open Source Powers DevOps Success with CloudBees</title>
      <description><![CDATA[CloudBees DevOps Evangelist, Brian Dawson sits down with Red Hat's Sales Director, Rich Savage to discuss how CloudBees can ease the pain of shifting to DevOps. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 15:15:18 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (CloudBees, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/how-open-source-powers-devops-success-with-cloudbees-Xa8cg0Xh</link>
      <enclosure length="25400957" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/a9bf04b0-e6f9-456c-b43c-8b45538d7bbf/2019-11-25-cloudbees-podcast-polished-high-quality-v2_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>How Open Source Powers DevOps Success with CloudBees</itunes:title>
      <itunes:author>CloudBees, Carahsoft</itunes:author>
      <itunes:duration>00:26:28</itunes:duration>
      <itunes:summary>CloudBees DevOps Evangelist, Brian Dawson sits down with Red Hat&apos;s Sales Director, Rich Savage to discuss how CloudBees can ease the pain of shifting to DevOps.</itunes:summary>
      <itunes:subtitle>CloudBees DevOps Evangelist, Brian Dawson sits down with Red Hat&apos;s Sales Director, Rich Savage to discuss how CloudBees can ease the pain of shifting to DevOps.</itunes:subtitle>
      <itunes:keywords>carahsoft, devops, open source, cloudbees</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b322613c-5eaa-4030-a6da-f1da1329e88a</guid>
      <title>Atlassian DevOps Delivers</title>
      <description><![CDATA[Atlassian Senior Solutions Engineer, Ken Urban sits down with Atlassian Sales Director, Sean O'Sullivan to discuss the benefits of using Atlassian solutions with DevOps. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 14:42:58 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Atlassian, Carahsoft)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/atlassian-devops-delivers-okWfzhQA</link>
      <enclosure length="12367456" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/69508fe7-d2a4-4282-b7d1-555404fdd127/atlassian-advantage-devops-delivers-with-ken-urban-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Atlassian DevOps Delivers</itunes:title>
      <itunes:author>Atlassian, Carahsoft</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/29e1ef4c-5f28-454b-858f-2e19f532635f/ae001939-fb03-4b55-85eb-4e0f33a373c0/3000x3000/ken-rss.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:53</itunes:duration>
      <itunes:summary>Atlassian Senior Solutions Engineer, Ken Urban sits down with Atlassian Sales Director, Sean O&apos;Sullivan to discuss the benefits of using Atlassian solutions with DevOps.</itunes:summary>
      <itunes:subtitle>Atlassian Senior Solutions Engineer, Ken Urban sits down with Atlassian Sales Director, Sean O&apos;Sullivan to discuss the benefits of using Atlassian solutions with DevOps.</itunes:subtitle>
      <itunes:keywords>atlassian, carahsoft, devops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">42f1210a-216e-46c6-96ab-9547aaa39bd1</guid>
      <title>IT Optimization with Red Hat</title>
      <description><![CDATA[Red Hat’s Chief Architect, Adam Clater, discusses the importance of IT Optimization in Government, the Red Hat solutions that enable optimization, and the benefits modernizing provides your agency. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 14:40:00 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (carahsoft, Red Hat)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/it-optimization-with-red-hat-PA_iVUwP</link>
      <enclosure length="7920655" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/8ba97d65-3e11-42ec-a602-95142921fee0/red-hat-podcast-with-adam-clater-wav-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>IT Optimization with Red Hat</itunes:title>
      <itunes:author>carahsoft, Red Hat</itunes:author>
      <itunes:duration>00:08:15</itunes:duration>
      <itunes:summary>Red Hat’s Chief Architect, Adam Clater, discusses the importance of IT Optimization in Government, the Red Hat solutions that enable optimization, and the benefits modernizing provides your agency.</itunes:summary>
      <itunes:subtitle>Red Hat’s Chief Architect, Adam Clater, discusses the importance of IT Optimization in Government, the Red Hat solutions that enable optimization, and the benefits modernizing provides your agency.</itunes:subtitle>
      <itunes:keywords>red hat, carahsoft, it optimization, it</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">edd96e43-b508-4702-8ae0-8efbda4124c4</guid>
      <title>Containers and IT Optimization with Red Hat</title>
      <description><![CDATA[Red Hat’s OpenShift Practice Lead, Chuck Svoboda, sits down with our Red Hat Sales Director, Rich Savage, to discuss the impact that containers have towards IT optimization across the public sector. 
]]></description>
      <pubDate>Fri, 17 Jul 2020 14:39:24 +0000</pubDate>
      <author>Hannah.Duncan@carahsoft.com (Carahsoft, Red Hat)</author>
      <link>https://carahcast-podcasts-on-technology-in-government.simplecast.com/episodes/containers-and-it-optimization-with-red-hat-VqghY_xa</link>
      <enclosure length="14622626" type="audio/mpeg" url="https://cdn.simplecast.com/audio/0dbbe8/0dbbe8b0-0085-4302-9f0e-97e4a21f1293/5b6ae90d-f2d9-49d4-be04-118073655513/chuck-svoboda-with-rich-savage-hq_tc.mp3?aid=rss_feed&amp;feed=sjwL0ZGE"/>
      <itunes:title>Containers and IT Optimization with Red Hat</itunes:title>
      <itunes:author>Carahsoft, Red Hat</itunes:author>
      <itunes:duration>00:15:14</itunes:duration>
      <itunes:summary>Red Hat’s OpenShift Practice Lead, Chuck Svoboda, sits down with our Red Hat Sales Director, Rich Savage, to discuss the impact that containers have towards IT optimization across the public sector.</itunes:summary>
      <itunes:subtitle>Red Hat’s OpenShift Practice Lead, Chuck Svoboda, sits down with our Red Hat Sales Director, Rich Savage, to discuss the impact that containers have towards IT optimization across the public sector.</itunes:subtitle>
      <itunes:keywords>red hat, carahsoft, it optimization, it</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>