Cybersecurity Workshop: Navigating the...
This workshop will cover advanced cyber defense techniques and tools, emerging technologies in identifying zero-day vulnerabilities, mission and system resilience and survivability, and much more. Please join fellow Cyber Test & Evaluation (T&E), Acquisition, and Operation professionals from the government, industry, and academia to share information, lessons learned and knowledge. Join us at the opening Session on Wen. August 30th for...
Multi-Domain Operations in an Extended...
Our theme this year, “Multi-Domain Operations in an Extended Range Environment”, will take a look at our need to be better and faster at getting our products to the warfighter and decision makers. Our intent is to peak discussions on how we can prioritize our resources, identify innovative solutions to overcome the status quo, even in the midst of resource and dollar limitations. We must move towards a test, training, and experimen...
i2 User and Training Conference
Join us for the ultimate i2 experience at the upcoming User and Training Conference in Alexandria this May! As the world's largest gathering of i2 professionals, it promises to be a stimulating opportunity for you to discover the latest innovations in i2, refine your tradecraft skills, and elevate your knowledge with our cutting-edge training sessions. This two-day conference is a must-attend event for anyone looking to stay ahead of the curve...
May 23, 2023
Organizer:
i2 Location:
Alexandria, VA
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
Stop Zero-Day Malware with Zero Stress
Cyberthreats continue to increase in volume and complexity, with threat actors developing new ways to avoid detection – including highly evasive malware. To help organizations outpace these evolving threats, Palo Alto Networks announces PAN-OS® 11.0 Nova, the latest version of its industry-leading PAN-OS software, unleashing 50+ product updates and innovations.Nova is a leap forward in network security. It stops 26% more zero-day mal...
Next-Gen Computing Workshop
A recent report from the Center for Strategic and International Studies says the Department of Defense needs to strengthen its software design in order to maintain a competitive edge against foreign adversaries. Harnessing the power of data and analytics remains a critical part of achieving mission goals across all federal agencies. Government organizations need to constantly innovate and strengthen software design in order to stay ahead of th...
January 19, 2023
Organizer:
GovExec Location:
Virtual
FCW Workshop: Cyber Strategies for 2023...
As the government moves increasingly towards digital infrastructure, geopolitical tensions rise, and individuals access more endpoints from more locations than ever before, a strong cyber posture must be embedded in everything agencies do. Policy guidance such as the cyber executive order, NIST’s updated security risk framework, and the Cyberspace Solarium’s recommendations offer strategic direction while tactical playbooks such as...
November 30, 2022
Organizer:
GovExec 360 Location:
Virtual
New Domains in Cybersecurity T&E
Cybersecurity is paramount in every phase of a system lifecycle. Professionals involved in Test and Evaluation are increasingly tasked with more rigorous controls, more complicated interconnections, and more contested operating environments. Cybersecurity is applied across all Government domains from common tactical networks to weapon systems. Instead of focusing on the depth of cybersecurity T&E in a single space, this workshop will focus...
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.