ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
Automating the Enterprise with Ansible...
Registration is Closed Enterprise-wide automation has become a necessity to keep pace with the evolving demands of modern IT. As security threats grow and workloads scale in complexity, federal government agencies require a simple but robust automation solution. Red Hat Ansible can help the U.S. Department of Homeland Security (DHS) automate its workloads and secure IT environments by automating compliance and governance. Join Red Hat on Sept...
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Splunk Security for NPOs Virtual Worksh...
This hands-on virtual workshop is designed to familiarize participants with how to leverage Splunk to search security events. Splunk experts will provide users a way to gain familiarity with searching in Splunk, as well as introducing a set of commands that allow users to effectively examine their security events. We will leverage the popular Boss of the SOC (BOTS) dataset in a question-and-answer format. Join us for a virtual workshop where a...
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
Public Sector Event: Analytics for Spre...
Spreadsheets have been deeply presented in our lives for many years; many cannot imagine a day without them. Between formulas, pivot tables, broken macros, VBA codes, debugging, circular references, auto-recovery files, and endless versions on a shared folder... spreadsheets have their limits. Join Alteryx to learn how states are using Alteryx to: Reduce their dependence on spreadsheetsIncrease their productivity Deliver actionable insights fr...
Public Sector Event: Analytics for Spre...
Spreadsheets have been deeply presented in our lives for many years; many cannot imagine a day without them. Between formulas, pivot tables, broken macros, VBA codes, debugging, circular references, auto-recovery files, and endless versions on a shared folder... spreadsheets have their limits. Join Alteryx to learn how states are using Alteryx to: Reduce their dependence on spreadsheetsIncrease their productivity Deliver actionable insights fr...
Public Sector Event: Analytics for Spre...
Spreadsheets have been deeply presented in our lives for many years; many cannot imagine a day without them. Between formulas, pivot tables, broken macros, VBA codes, debugging, circular references, auto-recovery files, and endless versions on a shared folder... spreadsheets have their limits. Join Alteryx to learn how states are using Alteryx to: Reduce their dependence on spreadsheetsIncrease their productivity Deliver actionable insights fr...
Public Sector Event: Analytics for Spre...
Spreadsheets have been deeply presented in our lives for many years; many cannot imagine a day without them. Between formulas, pivot tables, broken macros, VBA codes, debugging, circular references, auto-recovery files, and endless versions on a shared folder... spreadsheets have their limits. Join Alteryx to learn how states are using Alteryx to: Reduce their dependence on spreadsheetsIncrease their productivity Deliver actionable insights fr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.