Federal News Network's Industry Exchang...
Is your agency maximizing hybrid and multicloud to meet mission demands? Join us for Federal News Network’s Industry Exchange Cloud on Nov. 4 to learn about the best tools, tactics and techniques to help you achieve effective, efficient and secure cloud services. Our 2023 Industry Exchange Cloud event featured speakers from Orca Security, Nutanix, Pluralsight, Commvault, Amazon Web Services, Future Tech Enterprises and Kelyn Technologies...
Fall Cyber Solutions Fest 2024: Emergin...
Join us for the inaugural year of SANS Emerging Technologies Track! Are you interested in learning more about new cutting-edge technology in the cybersecurity industry? This is the place for you! Learn from the best and brightest in the industry as selected organizations review their latest tools and solutions that will better equip you for your battle with the bad guys and assist you as your team works hard to keep networks safe from intrusio...
Fall Cyber Solutions Fest 2024: SOC/SOA...
For people who don't work in a SOC, or in cybersecurity at all, the image of a cybersecurity operations center is that of an all-seeing, all-knowing marvel of technology. For those of us who work in a SOC, we know the technology requires constant care and maintenance to preserve visibility into the systems we're protecting. If we can preserve that visibility, we then strive to deploy appropriate and effective detections. Once we've tuned those...
Fall Cyber Solutions Fest 2024: Detecti...
For people who don't work in a SOC, or in cybersecurity at all, the image of a cybersecurity operations center is that of an all-seeing, all-knowing marvel of technology. For those of us who work in a SOC, we know the technology requires constant care and maintenance to preserve visibility into the systems we're protecting. If we can preserve that visibility, we then strive to deploy appropriate and effective detections. Once we've tuned those...
Fall Cyber Solutions Fest 2024: Threat Track
Going from responding to incidents to actively hunting threats is a stance shift that requires maturity in your cybersecurity journey. It also requires having access to the right threat intelligence, the right visibility across your environment, as well as the right tools to do the job. Advances in data science and artificial intelligence can help organizations bridge the maturity gap, but we shouldn’t forget that it’s ultimately a...
Fall Cyber Solutions Fest: Zero Trust
In an era where cyber threats constantly evolve and the boundaries of organizations become increasingly porous, the principle of "Never Trust, Always Verify" has become more relevant than ever. The Zero Trust Solutions Forum 2024 aims to bring together top industry vendors to shed light on the newest developments, technologies, and best practices in the realm of Zero Trust. Participants will gain invaluable insights into: Emerging Technologies...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Best Practices in Floodplain Management...
Join us on November 12, 2024 from 12:00 PM - 2:00 PM Eastern for Best Practices in Floodplain Management Associated With Dam Safety Management and Dam Rehabilitation. This webinar provides an overview of the history, recent trends, and best practices in floodplain management as relates to dam safety management, with a special focus on dam rehabilitation and FEMA’s High Hazard Potential Dam (HHPD) Rehabilitation Grant Program. Learning ob...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.