Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. We invite you to join our webinar as we explore the intricate and powerful combination of Zero Trust and insider risk management! During this session, our speakers will: I...
Strategies for Rapid Digital Modernization
Many agencies are looking for ways to advance their modernization efforts while reducing risk, maximizing cost efficiency, and increasing speed to deployment. With modernization at the forefront of improving customer experience, it’s paramount to understand how to accelerate digital transformation through actionable strategies. On June 11, join GovExec TV and Maximus for a deep dive into digital modernization. Explore the “digital-...
June 11, 2024
Organizer:
Maximus Location:
Virtual
Trade Compliance Toolbox: A Jurisdictio...
Trade Compliance Toolbox: A Jurisdiction and Classification Deep Dive In today's globalized business landscape, adherence to export compliance is paramount, and accurate classification is the foundation of ensuring regulatory compliance. Join former regulators Candace Goforth, Tony Dearth, and Bruce O’Cain as they analyze the classification process and provide benchmarking information and tips on conducting classification assessments for...
Cybersecurity Division Meeting
Cybersecurity continues to be one of the fastest-moving policy topics for contractors in the public sector market. To stay up to date on the latest contractor requirements, join the NDIA Cybersecurity Division for our bi-annual meeting slated for June 10, 2024, to get updates from our Committees on Legal and Policy issues, Software Assurance, Cybersecurity Standards, and Supply Chain Risk Management. Join colleagues and counterparts as we hear...
Cybersecurity Trends for Midsize Enterp...
Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver services with small teams and limited budgets. Across industries, MSE IT budgets average 4.9% of annual revenue, but only 5% of the IT budget is dedicated to security. The need to create a strong, mature security posture remains. Join this complimentary Gartner security and risk webinar as Gartner experts explore the top trends that MSE IT leaders r...
June 10, 2024
Organizer:
Gartner Location:
Webcast
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
June 2-7, 2024
Organizer:
Infosec Location:
San Diego, CA
How to Use AI Responsibly
AI has the power to transform the way governments work. However, that transformative power poses risks and is rife with the potential for misuse. To harness AI’s power ethically, agencies need to invest in responsible AI practices. Join us online Wednesday, June 5 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government and industry leaders about the attributes associated with responsible AI and how to use it effectively at your orga...
June 5, 2024
Organizer:
GovLoop Location:
Virtual
Consolidation with CrowdStrike
Evolving cyber threats are making an enterprise-wide impact on organizations, forcing business leaders to make complex decisions about the future of their security program and overall strategy. Many organizations have adopted countless security tools, resulting in a disconnected, disjointed security stack that causes operational distress, burns a hole in their pocket and even puts them at further risk because adversaries thrive in complexity....
How To Upgrade Your Cybersecurity Risk...
Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip. What would it look like to upgrade your Cybersecurity risk assessment capabilities? As an essential element to support your cybersecurity program, performing cybersecurity risk assessments is critical for organizations of all sizes and sectors. With cyber threats evolving in com...
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, despite their ubiquity, wireless devices are still susceptible to insider threats. And with the September 30, 2024 deadline to implement Wireless Intrusion Detections for SCIFs and SAPFs quickly approaching, now is the time to learn how to reduce your risk. Insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed li...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.