ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
May 12-17, 2024
Organizer:
Infosec Location:
Virtual
Alteryx Inspire 2024
Inspire is the analytics event and is meant to get attendees motivated and encouraged by the value of analytics. Whether you’re an AI expert or analytics beginner, fuel your problem-solving fire with top-notch content delivered through exhilarating keynotes, breakouts, and training sessions. Throughout our 4-day event, you will see how to solve your most challenging and complex problems, faster and better, and show your bosses the real b...
May 13-16, 2024
Organizer:
Alteryx Location:
Las Vegas, NV
Splunk Workshop Series
Join us for our workshop series designed to enhance Splunk skill sets across your organization! Our five-part virtual workshop series covers fundamental basics, machine learning, observability, dashboard studio, and investigating fraud. Led by industry experts, these hands-on workshops will empower your teams to unlock the full potential of Splunk! Date & Time Workshop Thursday, April 18th 2:00pm ET; 11:00am PT 2 hours Splunk 101 Topics co...
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
May 19-24, 2024
Organizer:
Infosec Location:
Virtual
Using Microsegmentation to Ease the Wei...
It may seem ironic, but government agencies at all levels wrestle with the difficulty of compliance with regulatory requirements even as they issue regulations for others (sometimes including themselves) to meet. For example, just as the healthcare industry follows HIPAA, so too do Veterans Administration hospitals – along with all federal, state, local, tribal and territorial health organizations. Then there are government-only policies...
May 22, 2024
Organizer:
FedInsider Location:
Webcast
Women in AFCEA Virtual Happy Hour: May 2024
Join Women in AFCEA for our popular virtual Happy Hour! Switch off from work, grab a drink, and join your fellow women professionals for a positive chat about life in the IT/Cyber/Global Security industry. Leading up to Pride Month, let's discuss the importance of including people from the LGBTQIA+ community. How can we as an organization and as individuals better enable the community?
Disarm Me CTF: Hack, Decrypt, Disable
This is a red team-style mixed capture the flag event that will require you and your team to actively break into an internal network as if you were a hacker. Put on your big kid pants cause this is big time! Thousands of organizations across the world are grappling with a new supply chain ransomware attack. A nefarious collective of hackers called The League has taken credit, but a consortium of affected organizations is turning to SAVE to tak...
Introduction to F5 BIG-IP Next
Join F5 for this virtual lab and get your hands on the Next generation of BIG-IP software! In this hands-on lab, you will learn: How to manage BIG-IP Next data plane nodes using the Central Manager GUI How to deploy and operate applications What a classic BIG-IP migration to Next entails How to protect applications using security policy HA and Next data plane upgrades How to debug BIG-IP Next Don't miss out - Register Now!
Prioritizing Mission Delivery & Zero Tr...
Agencies increasingly rely on Software-as-a-Service (SaaS) platforms such as Salesforce for mission-critical functions, which offers them numerous benefits including flexibility, reducing upfront IT resource costs and delegating upgrades and patches to the provider. Using Salesforce does not remove the agencies’ responsibility for cybersecurity, however, and SaaS applications face their own risks, including misconfigurations, poor access...
June 5, 2024
Organizer:
FedInsider Location:
Webcast
Kansas City Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
June 6, 2024
Organizer:
FutureCon Location:
Kansas City, KS
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.