Fall Cyber Solutions Fest 2024: Threat Track
Going from responding to incidents to actively hunting threats is a stance shift that requires maturity in your cybersecurity journey. It also requires having access to the right threat intelligence, the right visibility across your environment, as well as the right tools to do the job. Advances in data science and artificial intelligence can help organizations bridge the maturity gap, but we shouldn’t forget that it’s ultimately a...
Fall Cyber Solutions Fest: Zero Trust
In an era where cyber threats constantly evolve and the boundaries of organizations become increasingly porous, the principle of "Never Trust, Always Verify" has become more relevant than ever. The Zero Trust Solutions Forum 2024 aims to bring together top industry vendors to shed light on the newest developments, technologies, and best practices in the realm of Zero Trust. Participants will gain invaluable insights into: Emerging Technologies...
Embracing Data-Driven Change to Enhance...
From the delivery of healthcare and public benefits to emergency management and national security, incorporating emerging technologies provides opportunities for government at all levels to enhance constituent services and increase engagement more broadly. Leveraging today’s rapidly evolving technology and available tools, government agencies can better distill large amounts of data to derive holistic insights, promptly identify areas fo...
November 8, 2024
Organizer:
FedInsider Location:
Webcast
How Industries Are Implementing AI Use Cases
Scaling and commercializing generative AI (GenAI) solutions across industries will require massive organizational efforts to bring them across the enterprise. Despite GenAI being relatively new, industries have moved fast on implementation and the majority of these case examples are already in use. As CIOs move beyond a basic understanding of GenAI and toward its implementation, we measure the progress by evaluating four key drivers: ability t...
November 8, 2024
Organizer:
Gartner Location:
Webcast
Analysis of HHS Expiring Contracts for...
Join us for the HHS Expiring FY25 Socio-Economic Set-Aside Contracts Presentation. Unique data compiled for Industry is not available anywhere but at this event. Join us as Brian Hebbel and Edward Schultz take a deep dive into HHS expiring contracts for FY 2025 to gain insight into what the data means to contractors targeting 12 different HHS agencies. The Presentation Includes:A Summary of the Socio-Economic Set-Aside data for every HHS Agenc...
Cybersecurity for beginners: Live train...
Are you thinking about a career in cybersecurity? Then you don’t want to miss this live, 3-part training series. In these hands-on capture-the-flag events, you’ll go from cybersecurity beginner to hunting down malware like a professional — even if you have zero cybersecurity experience! Join 20-year educator Keatron Evans as he teaches you technical cybersecurity in record time by combining proven learning methods with the tr...
November 8, 2024
Organizer:
Infosec Location:
Webcast
7 Disruptions You Might Not See Coming...
Disruptions are fundamental shifts that create lasting change that does not tend to go away unless disrupted by something else. CIOs and IT leaders must embrace the notion that disruption will continue and become more frequent. This will decide who leads and who follows. Join this complimentary Gartner CIO leadership webinar as a Gartner expert reveals the seven disruptions that promise seismic, generational change, including generative AI and...
November 11, 2024
Organizer:
Gartner Location:
Webcast
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.