CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Big Data, Big Challenges: How Governmen...
Data is the biggest asset of modern organizations. But thanks to an increase in data breaches, evolving privacy regulations, and litigation volumes, data can also be an organization’s biggest liability. Good data governance is critical to government agencies’ ability to effectively respond to requests for data and reduce their overall risk. Join us online Tuesday, June 25 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government...
June 25, 2024
Organizer:
GovLoop Location:
Virtual
Securing Supply Chains: How Data and Te...
In an increasingly connected world, disruptions to supply chains can severely impact the Department of Defense’s ability to sustain readiness and execute missions. Consequently, it's critical to analyze, predict, and mitigate potential supply chain risks through innovation in technology and data. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense indus...
June 25, 2024
Organizer:
GovExec Location:
Webcast
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer:
FedInsider Location:
Webcast
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer:
FedInsider Location:
Webcast
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
July 7-12, 2024
Organizer:
Infosec Location:
Virtual
Quantum Speaker Series PQC Roadmap
Christian Lowry is the Emerging Risks Branch Chief in the National Risk Management Center, part of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Christian leads a team of analysts assessing risks to critical infrastructure from emerging technologies, including artificial intelligence and quantum computing. Christian has also led NRMC’s analysis efforts related to the Information...
July 9, 2024
Organizer:
ATARC Location:
Webcast
Revolutionizing Supply Chain Management...
Sayari Global Head of Analytical Solutions David Lynch demonstrates the utility of unified public, commercial and corporate data in illuminating hidden supply chain risk including connections to military end users, state owned enterprises and sanctioned networks. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense industrial base suppliers, identify transship...
Assessing Controls in Performance Audits
Internal control is an important focus for auditors as they commonly identify weaknesses in internal controls as an underlying cause of organizations struggling to deliver effective and efficient results. Through lecture, group discussions, and case studies, this course provides auditors with a comprehensive understanding of the five components of internal control and the 17 underlying principles. The course will explain the audit planning and...
July 10-11, 2024
Organizer:
Parker CPE Location:
Webcast
ISC2 CGRC® Training Boot Camp (previous...
Infosec’s CGRC Boot Camp teaches you best practices, policies and procedures used to authorize and maintain information systems. You’ll learn how to use the RMF to support your organization’s operations while complying with legal and regulatory requirements. The ISC2 Certified in Governance, Risk and Compliance (CGRC) is sought after by civilian, state and local governments, as well as system integrators supporting these orga...
July 10-12, 2024
Organizer:
Infosec Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.