Back to Search Begin New Search Save Search Auto-Notify
Seepage Through Earth Dams
This introductory course is designed to be a participatory, interactive workshop, which will cover the basic elements required to understand and evaluate seepage-related issues for earth dams. The course begins with providing an understanding of why seepage mechanisms in earth dams are important to dam safety. Information on seepage mechanics, including permeability and erodibility will then be presented. The presentations will then progress t...
June 18-21, 2024
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing AI: Cybersecurity Operations/S...
Join us for our new two-day, interactive global workshops focused on identifying opportunities and managing the risks associated with artificial intelligence. Engage with your peers as we take an in-depth, hands-on look at how to secure the use of AI and discover ways AI uses our data through a practical risk management lens. Securing AI: Cybersecurity OperationsGain essential tools to secure systems in the AI era. Learn how AI can impact both...
June 20-21, 2024
Organizer: ISC2
Location: Denver, CO
Add Favorite
INTERFACE Phoenix 2024
Welcome to INTERFACE Phoenix 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
June 21, 2024
Organizer: F2F Events, Inc.
Location: Scottsdale, AZ
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Boosting Data Security & Cyber Resilien...
All the elements of the U.S. healthcare system are under siege by hackers. A recent article in Modern Healthcare reported that “[o]ver the past five years, there’s been a 256% increase in large breaches reported to [the U.S. Department of Health and Human Services] involving hacking and a 264% increase in ransomware.” Federal health agencies face the same risks – and private-sector attacks ripple through the agencies, a...
July 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search