CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
The Role of Deterrence of Insider Risk...
This webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program. Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.
May 21, 2024
Organizer:
ATARC Location:
Webcast
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer:
Qualys Location:
Washington, DC
AI Solutions to Close the Risk-Confiden...
While AI is a powerful tool for businesses, it's important to remember: not all AI solutions are created equal. Organizations must carefully evaluate AI options to ensure they align with specific needs and organizational or mission objectives. In this conversational webinar our panel of subject matter experts will discuss the differences between generative and predictive AI and how to apply AI-powered technologies to help solve organizational...
AI Progress 2024: Challenges and Opport...
Artificial intelligence has quickly made it’s way to the top of technology conversations in government and industry. While the technology continues to evolve, how can you best mitigate risks and identify opportunities? Join moderator Justin Doubleday, and government and industry leaders as they discuss AI in government trends, challenges and goals for the future. Learning objectives: Trends of using AI in the government space Considering...
Navigating Regulatory Frameworks for Ex...
In an era where digital transformation is integral to how we do business, the significance of adhering to compliance frameworks and mitigating associated risks cannot be overstated. Organizations face the dual challenge of ensuring they are resilient against threats while also remaining compliant with an evolving landscape of regulatory requirements. Join us for a strategic session that delves into the essentials of the Risk Management Framew...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
How To Upgrade Your Cybersecurity Risk...
Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip. What would it look like to upgrade your Cybersecurity risk assessment capabilities? As an essential element to support your cybersecurity program, performing cybersecurity risk assessments is critical for organizations of all sizes and sectors. With cyber threats evolving in com...
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, despite their ubiquity, wireless devices are still susceptible to insider threats. And with the September 30, 2024 deadline to implement Wireless Intrusion Detections for SCIFs and SAPFs quickly approaching, now is the time to learn how to reduce your risk. Insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed li...
How to Use AI Responsibly
AI has the power to transform the way governments work. However, that transformative power poses risks and is rife with the potential for misuse. To harness AI’s power ethically, agencies need to invest in responsible AI practices. Join us online Wednesday, June 5 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government and industry leaders about the attributes associated with responsible AI and how to use it effectively at your orga...
June 5, 2024
Organizer:
GovLoop Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.