Back to Search Begin New Search Save Search Auto-Notify
Trends in Information Sharing: AI Impac...
Trends in Information Sharing: AI Impacts on Regulatory Compliance and Best Practices The continuing evolution and use of artificial intelligence is reshaping compliance frameworks, necessitating more efficient and secure information sharing practices across industries worldwide. Join us as we explore the transformative effects of AI on the regulatory landscape and best practices concerning the protection and sharing of various types of sensit...
June 4, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
Empowering Virtual Training in Governme...
In today's digital landscape, government agencies are increasingly turning to virtual platforms for training, education, and seminars. This transition requires sophisticated tools and strategies to ensure seamless and effective experiences. As technology reshapes how government agencies like the Department of Commerce (DOC) and its sub-agencies approach these initiatives, it's crucial to stay updated with best practices and emerging trends. Jo...
June 5, 2024
Organizer: Adobe Government Team at Carahsoft
Location: Webcast
Add Favorite
Protecting Critical Infrastructure Requ...
When FBI Director Christopher Wray speaks publicly about the cyberthreat posed by the Chinese government to U.S. critical infrastructure, it is past time to take the danger seriously. “The PRC [People’s Republic of China] has made it clear that it considers every sector that makes our society run as fair game in its bid to dominate on the world stage, and that its plan is to land low blows against civilian infrastructure to try to...
June 6, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How to Defend Your Expanding Attack Surface
There are plenty of benefits to innovative new technologies, from greater efficiency to cost savings to customer satisfaction. It is rare, however, for a new technology to truly replace existing IT – rather, it gets incorporated into or bolted onto current systems. This approach, along with the explosion of mobile devices and proliferation of software and SaaS applications, dramatically increases and clouds an Agency’s cyber footpr...
June 18, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Beyond Traditional Boundaries: Moderniz...
While the Personal Identity Verification (PIV) and Common Access Card (CAC) represent a high assurance, technically interoperable, and a highly regulated method of authentication, they suffer from factors such as ease of use, ability to work with mobile devices and across devices. Office of Management and Budget (OMB) memorandum M-19-17, Enabling Mission Delivery Through Improved Identity, Credential, and Access Management, opened the door for...
July 11, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
AI for Government: Opportunities & Challenges
The continuous evolution of technology presents us with a dynamic landscape filled with both promise and challenges. As the internet gained widespread adoption, it revolutionized various aspects of our lives, introducing innovations such as online shopping and real-time news updates, alongside issues like spam, phishing, and malware. Traditionally, government entities have been cautious in adopting new technologies, often due to regulatory con...
July 16, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Systems Security Plan - ( NIST Based SSP)
Join this event on using the National Institute of Standards and Technology (NIST) approach for creatin a comprehensive on Systems Security Plan (SSP). This overview event is designed to equip participants with the knowledge and skills needed start the process of development and implementation of an effective security plans for federal information systems. Key Topics Covered: Understanding the NIST security standards and guidelines Implementin...
September 17, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
September 23, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
September 30, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Back to Search Begin New Search