Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
Tools for Designing and Assessing Spillways
Join us on October 8, from 12:00 PM - 2:00 PM Eastern for Tools for Designing and Assessing Spillways. Spillways are complex hydraulic structures with materials and geometries that are often tailored to unique site conditions. As such, the analysis associated with the design and assessment of spillways needs to be commensurate with the complexity of the structure and the risk posed by the structure. Some of the complex hydraulic issues often c...
Bringing Digital Transformation to Fede...
The Office of Inspector General (OIG) serves as the internal watchdog for all federal departments and agencies. The 75 inspectors general are broadly responsible for preventing and detecting fraud, waste, abuse, misconduct, and mismanagement in their domains, and promoting economy, efficiency, and effectiveness in operations and programs. The Department of Health and Human Services OIG, for instance, employs more than 1,600 public servants to...
October 10, 2024
Organizer:
FedInsider Location:
Webcast
Using Generative AI to Transform the Co...
From the delivery of healthcare and public benefits to emergency management and national security, generative AI – GenAI, for short – presents opportunities for governments to enhance constituent services. GenAI can empower front-line civil servants, improve the accessibility of public services, and enhance back-office processes. In pursuit of these benefits, federal spending on AI increased 22 percent since 2021—and 250 perc...
October 11, 2024
Organizer:
FedInsider Location:
Webcast
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
Dam Construction Inspection
This course serves as an introduction and guidance on construction oversight and inspections associated with the construction or modification of a dam and appurtenant structures. Learning objectives attendees will receive from this course: Organization, communication, and the roles, responsibilities, and authority of project team members. Emergency operations for dam and levee failures and incidents. Importance of dam construction documentatio...
International Telemetering Conference (ITC)
The 59th Annual ITC conference this year is “Innovation Integration". ITC takes pride in addressing the wide range of topics important to the telemetry professional. The exhibit areas showcase the latest systems, and technical sessions lay the groundwork for tomorrow’s systems. Numerous short courses are available to help practicing professionals stay current in their fields. Telemetry systems collect, transmit, store, interpret, a...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
Systems Security Plan - ( NIST Based SSP)
Join this event on using the National Institute of Standards and Technology (NIST) approach for creatin a comprehensive on Systems Security Plan (SSP). This overview event is designed to equip participants with the knowledge and skills needed start the process of development and implementation of an effective security plans for federal information systems. Key Topics Covered: Understanding the NIST security standards and guidelines Implementin...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.