Back to Search Begin New Search Save Search Auto-Notify
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
May 13-17, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
VIP START - May 2024
VIP START is a 3-day, 27-hour veteran entrepreneurship training program that is offered at NO COST to Veterans nationwide. The program is designed specifically for service-disabled and Veteran-owned small businesses interested in entering or scaling in the federal marketplace. With a curriculum created and taught by industry and subject matter experts, VIP START mitigates company risk and ensures that they are procurement ready upon graduation.
May 14-16, 2024
Organizer: Veteran Institute for Procurement
Location: Potomac, MD
Add Favorite
The Role of Deterrence of Insider Risk...
This webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program. Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.
May 21, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer: Qualys
Location: Washington, DC
Add Favorite
AI Solutions to Close the Risk-Confiden...
While AI is a powerful tool for businesses, it's important to remember: not all AI solutions are created equal. Organizations must carefully evaluate AI options to ensure they align with specific needs and organizational or mission objectives. In this conversational webinar our panel of subject matter experts will discuss the differences between generative and predictive AI and how to apply AI-powered technologies to help solve organizational...
May 22, 2024
Organizer: Babel Street
Location: Webcast
Add Favorite
AI Progress 2024: Challenges and Opport...
Artificial intelligence has quickly made it’s way to the top of technology conversations in government and industry. While the technology continues to evolve, how can you best mitigate risks and identify opportunities? Join moderator Justin Doubleday, and government and industry leaders as they discuss AI in government trends, challenges and goals for the future. Learning objectives: Trends of using AI in the government space Considering...
May 22, 2024
Organizer: Federal News Network
Location: Webcast
Add Favorite
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Join us for a strategic session that delves into the essentials of the Risk Management Framew...
May 23, 2024
Organizer: Elastic Government Team at Carahsoft
Location: Webcast
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
May 30-31, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
How To Upgrade Your Cybersecurity Risk...
Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip. What would it look like to upgrade your Cybersecurity risk assessment capabilities? As an essential element to support your cybersecurity program, performing cybersecurity risk assessments is critical for organizations of all sizes and sectors. With cyber threats evolving in com...
June 4, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, despite their ubiquity, wireless devices are still susceptible to insider threats. And with the September 30, 2024 deadline to implement Wireless Intrusion Detections for SCIFs and SAPFs quickly approaching, now is the time to learn how to reduce your risk. Insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed li...
June 4, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Back to Search Begin New Search