Back to Search Begin New Search Save Search Auto-Notify
Procurement Integrity - Analytics to Re...
SAS' solutions introduce an approach to layer an analytic system on top of your existing systems, creating a continuous monitoring solution. In their upcoming webinar, subject matter experts will highlight real world examples, showing how other government entities improved their procurement and accounts payable processes by integrating with SAP, Oracle and other ERP systems. Join SAS' webinar, where you can also expect to learn more about: Ris...
June 20, 2024
Organizer: SAS Government Team at Carahsoft
Location: Webcast
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Big Data, Big Challenges: How Governmen...
Data is the biggest asset of modern organizations. But thanks to an increase in data breaches, evolving privacy regulations, and litigation volumes, data can also be an organization’s biggest liability. Good data governance is critical to government agencies’ ability to effectively respond to requests for data and reduce their overall risk. Join us online Tuesday, June 25 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government...
June 25, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
July 7-12, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Revolutionizing Supply Chain Management...
Sayari Global Head of Analytical Solutions David Lynch demonstrates the utility of unified public, commercial and corporate data in illuminating hidden supply chain risk including connections to military end users, state owned enterprises and sanctioned networks. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense industrial base suppliers, identify transship...
July 10, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Enhancing OSINT Investigations with Dar...
In the realm of Open Source Intelligence (OSINT), the ability to gather, analyze, and interpret publicly available information is critical. This webinar explores the world of OSINT investigations, highlighting how the strategic use of dark web data can significantly enhance OSINT information to identify threats and risks posed to organizations. During this session, Erin will demonstrate using DarkOwl Vision: Gathering, analyzing, and interpre...
July 10, 2024
Organizer: DarkOwl Government Team at Carahsoft
Location: Webcast
Add Favorite
ISC2 CGRC® Training Boot Camp (previous...
Infosec’s CGRC Boot Camp teaches you best practices, policies and procedures used to authorize and maintain information systems. You’ll learn how to use the RMF to support your organization’s operations while complying with legal and regulatory requirements. The ISC2 Certified in Governance, Risk and Compliance (CGRC) is sought after by civilian, state and local governments, as well as system integrators supporting these orga...
July 10-12, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
July 11-12, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
July 22-26, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search