Back to Search Begin New Search Save Search Auto-Notify
How Government Is Boosting Data Resilie...
Whether it’s a hurricane, fire, insider threat or outdated systems, disaster can strike at any point for a government agency. However, even in times of crisis the government’s mission remains. Agencies need a robust business continuity and disaster recovery plan to ensure that vital government services are still working. But keeping those systems running isn’t as simple as having a backup drive somewhere. Instead, agencies ne...
May 14, 2024
Organizer: GovLoop
Location: Webcast
Add Favorite
Ethical Hacking Dual Certification Boot...
Delve into the tools and techniques used by cybercriminals over five days. Gain in-depth training in ethical hacking methodologies through lectures and hands-on labs. Our cloud-hosted cyber range provides practical experience in reconnaissance, system access, vulnerability exploitation and data exfiltration. You’ll gain two highly sought-after certifications: EC-Council Certified Ethical Hacker (CEH) and CompTIA PenTest+. These certifica...
May 20-24, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Microsoft Tech Brief: Improve Data Secu...
Thank you for the overwhelming response. The enrollment capacity for this event has been reached. Join us at Microsoft Tech Brief: Improve Data Security with Microsoft Purview, a free event, to understand how to improve your organization’s security posture by discovering, protecting, and preventing the loss of data and managing insider risk across clouds, apps, and endpoints. You’ll learn how to use AI to close visibility gaps and...
May 22, 2024
Organizer: Microsoft
Location: Virtual
Add Favorite
How Agencies Can Protect Critical Data
Data is every agency’s most valuable asset – and it needs to be protected as such. However, not every dataset requires the same level of security. The key is knowing which data needs to be under lock and key. Join us online Wednesday, June 12 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government and industry experts about how to protect critical datasets. Specifically, you’ll learn: How to categorize data so that agenc...
June 12, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search