Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer:
FedInsider Location:
Webcast
Sponsored Content: Palmetier Law - Unle...
Unleashing Small Business Innovations: A Path to Growth and ProsperityPART 2 of 2 SPONSORED CONTENT Webinar is Complimentary & Recorded Kari Palmetier, Palmetier Law The role of small businesses in driving innovation in the federal government has never been more crucial. This two-part webinar explores the basis and requirements of Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) programs and the ways...
Facilitating Low-Head Dam Removals and...
Join us on July 9, from 12:00 PM - 2:00 PM Eastern for Facilitating Low-Head Dam Removals and Improving Aquatic Resource Restoration Outcomes. Many low-head dams no longer serve their original purpose and their existence often poses a public safety risk and continues to have negative impacts on aquatic resources. This webinar will focus on effective strategies for low head dam removal and aquatic resource restoration in Pennsylvania over the l...
AI for Government: Opportunities & Challenges
The continuous evolution of technology presents us with a dynamic landscape filled with both promise and challenges. As the internet gained widespread adoption, it revolutionized various aspects of our lives, introducing innovations such as online shopping and real-time news updates, alongside issues like spam, phishing, and malware. Traditionally, government entities have been cautious in adopting new technologies, often due to regulatory con...
July 16, 2024
Organizer:
FedInsider Location:
Webcast
Election Security: Protecting the Found...
States’ voter registration systems and voter access have undergone a host of changes over the past five years, thanks in large part to the Covid-19 pandemic. Many states expanded vote-by-mail options, stepped up automatic voter registration programs, or both. Cities took action, as well – Los Angeles, for instance, has overhauled its voting system infrastructure, using open source, the cloud, and cybersecurity partnerships to updat...
July 18, 2024
Organizer:
FedInsider Location:
Webcast
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Using the Cone Penetrometer Test (CPT)...
Join us on August 13, from 12:00 PM - 2:00 PM Eastern for Using the Cone Penetrometer Test (CPT) for Evaluation of Dams and Levees. This webinar will comprehensively cover the Cone Penetrometer Test (CPT) from the most basic ideas to advanced topics. It will be engaging, interesting, and enjoyable to watch. The most important concepts will be fully described. There will be numerous examples of state-of-the-art evaluations. Stratigraphy evaluat...
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and eva...
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
Hydraulic Tour of Standard NRCS Inlet Risers
Join us on September 10, from 12:00 PM - 2:00 PM Eastern for Hydraulic Tour of Standard NRCS Inlet Risers. This webinar will describe USDA-NRCS riser inlets for watershed dams. USDA-ARS research on various riser configurations informed the current standard NRCS riser design. Other NRCS inlet risers exist for specific design situations. Maintenance concerns for continued optimum riser performance will be discussed. Finally, this webinar will ex...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.