Back to Search Begin New Search Save Search Auto-Notify
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Big Data, Big Challenges: How Governmen...
Data is the biggest asset of modern organizations. But thanks to an increase in data breaches, evolving privacy regulations, and litigation volumes, data can also be an organization’s biggest liability. Good data governance is critical to government agencies’ ability to effectively respond to requests for data and reduce their overall risk. Join us online Tuesday, June 25 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government...
June 25, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
Securing Supply Chains: How Data and Te...
In an increasingly connected world, disruptions to supply chains can severely impact the Department of Defense’s ability to sustain readiness and execute missions. Consequently, it's critical to analyze, predict, and mitigate potential supply chain risks through innovation in technology and data. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense indus...
June 25, 2024
Organizer: GovExec
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
July 7-12, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Quantum Speaker Series PQC Roadmap
Christian Lowry is the Emerging Risks Branch Chief in the National Risk Management Center, part of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Christian leads a team of analysts assessing risks to critical infrastructure from emerging technologies, including artificial intelligence and quantum computing. Christian has also led NRMC’s analysis efforts related to the Information...
July 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Revolutionizing Supply Chain Management...
Sayari Global Head of Analytical Solutions David Lynch demonstrates the utility of unified public, commercial and corporate data in illuminating hidden supply chain risk including connections to military end users, state owned enterprises and sanctioned networks. By layering publicly available information sources, analysts and government officials can more effectively uncover hidden risk in defense industrial base suppliers, identify transship...
July 10, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Assessing Controls in Performance Audits
Internal control is an important focus for auditors as they commonly identify weaknesses in internal controls as an underlying cause of organizations struggling to deliver effective and efficient results. Through lecture, group discussions, and case studies, this course provides auditors with a comprehensive understanding of the five components of internal control and the 17 underlying principles. The course will explain the audit planning and...
July 10-11, 2024
Organizer: Parker CPE
Location: Webcast
Add Favorite
ISC2 CGRC® Training Boot Camp (previous...
Infosec’s CGRC Boot Camp teaches you best practices, policies and procedures used to authorize and maintain information systems. You’ll learn how to use the RMF to support your organization’s operations while complying with legal and regulatory requirements. The ISC2 Certified in Governance, Risk and Compliance (CGRC) is sought after by civilian, state and local governments, as well as system integrators supporting these orga...
July 10-12, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Back to Search Begin New Search