i2 User and Training Conference
Join us for the ultimate i2 experience at the upcoming User and Training Conference in Alexandria this May! As the world's largest gathering of i2 professionals, it promises to be a stimulating opportunity for you to discover the latest innovations in i2, refine your tradecraft skills, and elevate your knowledge with our cutting-edge training sessions. This two-day conference is a must-attend event for anyone looking to stay ahead of the curve...
May 23, 2023
Organizer:
i2 Location:
Alexandria, VA
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
Stop Zero-Day Malware with Zero Stress
Cyberthreats continue to increase in volume and complexity, with threat actors developing new ways to avoid detection – including highly evasive malware. To help organizations outpace these evolving threats, Palo Alto Networks announces PAN-OS® 11.0 Nova, the latest version of its industry-leading PAN-OS software, unleashing 50+ product updates and innovations.Nova is a leap forward in network security. It stops 26% more zero-day mal...
Next-Gen Computing Workshop
A recent report from the Center for Strategic and International Studies says the Department of Defense needs to strengthen its software design in order to maintain a competitive edge against foreign adversaries. Harnessing the power of data and analytics remains a critical part of achieving mission goals across all federal agencies. Government organizations need to constantly innovate and strengthen software design in order to stay ahead of th...
January 19, 2023
Organizer:
GovExec Location:
Virtual
FCW Workshop: Cyber Strategies for 2023...
As the government moves increasingly towards digital infrastructure, geopolitical tensions rise, and individuals access more endpoints from more locations than ever before, a strong cyber posture must be embedded in everything agencies do. Policy guidance such as the cyber executive order, NIST’s updated security risk framework, and the Cyberspace Solarium’s recommendations offer strategic direction while tactical playbooks such as...
November 30, 2022
Organizer:
GovExec 360 Location:
Virtual
New Domains in Cybersecurity T&E
Cybersecurity is paramount in every phase of a system lifecycle. Professionals involved in Test and Evaluation are increasingly tasked with more rigorous controls, more complicated interconnections, and more contested operating environments. Cybersecurity is applied across all Government domains from common tactical networks to weapon systems. Instead of focusing on the depth of cybersecurity T&E in a single space, this workshop will focus...
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
ResponderCon: Investigating Ransomware
The only event focused on DFIR and Ransomware! ResponderCon: Investigating Ransomware is dedicated to helping cyber responders and DFIR examiners investigate ransomware. While other events focus on preventing the attack, this focuses on what to do after it happens. Cyber First Responders will learn about: Tools and techniques that they can use when they get called up Different behaviors of ransomware families How other responders treat these...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.