Back to Search Begin New Search Save Search Auto-Notify
Countering Advanced Threats in a Rapidl...
Today’s adversaries are more sophisticated and agile than ever before, utilizing rapidly changing tactics to exploit vulnerabilities. Within mere minutes, adversaries can move laterally across a network, making it critical for defense agencies to adopt proactive, layered approaches to security. The integration of advanced threat intelligence and robust threat hunting capabilities is key to detecting, disrupting and stopping these threats...
November 14, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
November 14-15, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
November 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
The GovExec Cybersecurity Futures Forum
The cybersecurity landscape for U.S. federal and defense sectors is evolving rapidly amid technological advancements and increasingly sophisticated threats. These organizations face unprecedented challenges in safeguarding sensitive data and critical infrastructure from adversaries who exploit evolving vulnerabilities. As federal networks expand into cloud computing, IoT, and interconnected systems, the attack surface broadens, necessitating r...
November 20, 2024
Organizer: GovExec
Location: McLean, VA
Add Favorite
Building Zero Trust on a Sound Foundation
Executive Order 14028 mandates agencies implement zero trust (ZT) architectures for all cyber networks. Zero trust relies on a full understanding of the cyber attack surface in order to move the boundary closer to the user and secure each component. Afterall, you can’t secure what you don’t know you have. Many agencies are still struggling to answer simple questions: What devices have access to our environments? Is the core softwar...
November 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CEIC East
CEIC EASTCMMC ECOSYSTEM SUMMIT + CMMC IMPLEMENTATION CONFERENCE Presented by CIC in Partnership with The Cyber AB We have carefully designed CEIC East so it has something for everyone in the broader CMMC ecosystem! Whether you are a CMMC novice looking for help getting started, a seasoned pro looking for advanced training, or a service provider who wants a sneak peek into next-generation solutions to help you more efficiently maintain CMMC-com...
November 21-22, 2024
Organizer: Forum Makers
Location: National Harbor, MD
Add Favorite
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
December 2, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively. Created in response to fee...
December 5-6, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
December 5-6, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
INTERFACE Seattle 2024
Welcome to INTERFACE Seattle 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
December 12, 2024
Organizer: F2F Events, Inc.
Location: Seattle, WA
Add Favorite
Back to Search Begin New Search