6,879 past events found
+ 278 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
ISACA CISM Training Boot Camp
At our CISM Boot Camp, we explore and develop your essential skills and knowledge in the following domains: Domain 1: Information security governance Domain 2: Information security risk management Domain 3: Information security program Domain 4: Incident management By the end of our CISM Boot Camp, you will have the knowledge, skills and confidence to excel in information security management and pass the CISM exam with flying colors.
June 3-7, 2024
Organizer: Infosec
Location: Dulles, VA
Add Favorite
CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
June 3-7, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
June 2-7, 2024
Organizer: Infosec
Location: San Diego, CA
Add Favorite
Supercharge Your Security by Unlocking...
If you have purchased Microsoft Defender XDR but have yet to deploy the Defender for Endpoint component, it’s time to put your investment to work. In today’s landscape, the average cost of a data breach exceeds $4 million globally.1 Defender for Endpoint helps to protect your business with automated, AI-powered capabilities that detect and respond rapidly to threats across the chain—including phishing, malware, and ransomware...
June 6, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Getting Identity Right Online: Insights...
Constituents want convenient, secure online government transactions via smartphones and laptops, but at the same time, bad actors are devising more clever schemes to impersonate real people and exploit online interactions. State governments stand in the middle as they attempt to provide frictionless digital services and make sure people are who they say they are. Join Government Technology and Socure for an in-depth exploration into the rapidl...
June 6, 2024
Organizer: Government Technology
Location: Webcast
Add Favorite
Minecraft Education Hackathon Celebrati...
We are delighted to invite you to the celebration ceremony of the Minecraft Education Hackathon Tournament. This special event is dedicated to celebrating the innovative efforts and achievements of educators and students from around the world. The Hackathon has been a testament to the power of collaboration and creativity across borders. As we gather to honor the exceptional projects and the brilliant young minds behind them, your presence as...
June 6, 2024
Organizer: Microsoft
Location: Webcast
Add Favorite
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
June 6, 2024
Organizer: UberEther Government Team at Carahsoft
Location: Webcast
Add Favorite
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. Reserve a spot and earn up to 3 Continuing Professional Education (CPE) credits by taking th...
June 6, 2024
Organizer: Armis Government Team at Carahsoft
Location: Reston, VA
Add Favorite
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
June 6, 2024
Organizer: Proofpoint Government Team at Carahsoft
Location: Webcast
Add Favorite
Back to Search Begin New Search