CloudSecNext Summit & Training 2024
Cloud-based services are becoming increasingly more attractive to organizations as they offer flexibility, increased operational efficiency, and improve the time to market products. However, protecting systems, applications, and data in the cloud presents a new set of challenges for organizations to overcome. This two-day Summit covers all aspects of the cloud security side of cybersecurity and will bring together a unique combination of real-...
September 30 - October 7, 2024
Organizer:
SANS Institute Location:
Denver, CO
Innovate Cybersecurity Summit
Innovate Cybersecurity Summit is an invitation-only, all-expenses-paid, cybersecurity education event for CISOs and cybersecurity executives. Expert Education Every session is built on direct experience. Every talk is built on specific here-and-now takeaways. Every piece of advice is agnostic of specific tool or technology. Elite Networking We’ve built a meeting place that provides more direct, quiet and valuable access to one of your mo...
October 6-8, 2024
Organizer:
Innovate Location:
Scottsdale, AZ
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
5G as a Digital Transformation Accelerant
The United States leads the world in adopting 5G technology for communications and wireless internet access, thanks to its high speed, low latency, and increased bandwidth access. This has provided a huge boost to digital transformation in both the public and private sectors. For instance, the rapid adoption of edge computing can be attributed to 5G’s superior qualities. The spread of 5G was accelerated by the pandemic, as agencies and b...
October 7, 2024
Organizer:
FedInsider Location:
Webcast
Maximize Productivity with Enhanced Dig...
Adobe is empowering agencies to transform their manual document processes into efficient digital ones with Adobe Document Cloud – featuring the world’s leading PDF and e-signature solutions. Adobe Acrobat solutions can help address the hurdles that are often encountered in sending out documents for signature, creating forms, and digitizing older content. Additionally, Adobe Acrobat Sign is empowering users to deliver fast, legal, a...
Cyber Security Training at SANS Norther...
Calling all aspiring and seasoned CISOs! We invite you to experience a premier, all-new style SANS Live Training event at the Executive Conference and Training Center in Dulles, VA this October. Through this training, you will develop the practical skills needed to build and lead a thriving security team while enhancing the capabilities that accelerate your organization's success. Our Chief Information Security Officer training teaches how to...
Tools for Designing and Assessing Spillways
Join us on October 8, from 12:00 PM - 2:00 PM Eastern for Tools for Designing and Assessing Spillways. Spillways are complex hydraulic structures with materials and geometries that are often tailored to unique site conditions. As such, the analysis associated with the design and assessment of spillways needs to be commensurate with the complexity of the structure and the risk posed by the structure. Some of the complex hydraulic issues often c...
AI Governance: Ensuring Responsible AI...
The recent Executive Order on Artificial Intelligence has established a new standard for the safe, secure, and trustworthy deployment of AI technologies. In response, federal institutions must implement robust governance frameworks to mitigate risks, safeguard privacy, and foster equity. However, the AI landscape is continuously and rapidly evolving, and agencies are encountering complex hurdles that make adopting a trusted AI platform a chall...
Anatomy of a Ransomware Attack: Protect...
Ransomware attacks are becoming alarmingly frequent and sophisticated. They pose severe risks to healthcare providers by compromising patient data, disrupting critical services, and imposing substantial financial burdens. According to data from the Zscaler ThreatLabz 2024 Ransomware Report, healthcare was a prime target of ransomware attacks throughout 2023 and into 2024, seeing a 126% increase year-over-year in the number of attacks. Understa...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.