Back to Search Begin New Search Save Search Auto-Notify
Cloud Security Alliance| CCSK Foundation v4.1
The Certificate of Cloud Security Knowledge OnDemand Training program promotes the use of best practices for providing security assurance within Cloud Computing. Intrinsec’s OnDemand CCSK Foundation resources will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Official CCSK Foundation Student Handbook Over 10 Hours of CCSK Video Content Accessible via your provided student account, you can conv...
Add Favorite
Transforming For The Age of Digital Inv...
Every day around the world, digital data is impacting investigations. Making it intelligent and actionable is what Cellebrite's Intelligence Investigative Platform does best. With an ever-growing variety of digital devices and cloud sources producing volumes of highly valuable data, investigators need intuitive solutions and training to leverage this critical source of evidence when resources are limited. Join us on Thursday, July 29th for a l...
Add Favorite
Analyzing Data: An Enterprise Resource...
The Congressional Research Service noted a decade ago that, “Intelligence is valuable only if it can be shared with consumers who need it, but, to the extent that it is more widely shared, risks of compromise are enhanced.” That report was prompted in part by 9/11. In the twenty years since, “need to know” has become “need to share” throughout the federal government as agencies have come to realize the value...
Add Favorite
Responsible AI and the Future of Work
The pandemic and great resignation have put talent acquisition and employee retainment front and center for companies and federal agencies alike. Today, there are several emerging technologies that can make a substantial impact on improving recruitment, reducing regrettable attrition, and promoting diversity and inclusion. At the forefront of this innovation is Artificial Intelligence (AI). Yet misconceptions, misunderstandings, and a lack of...
Add Favorite
Modernizing Government's Distributed Wo...
Governments everywhere and at all levels should be applauded for finding ways to meet their citizens’ needs during the pandemic. While many agencies had continuity-of-operations plans in place, no one imagined that every agency would have to act on them at the same time. What made it possible, of course, was the rapid spread of cloud-based technology that enabled government employees to work from their own homes, frequently using their o...
Add Favorite
Additive Manufacturing: The Next Genera...
The U.S. military maintains bases in more than 70 countries and territories around the world, some of them in inhospitable or hard-to-reach areas. When a piece of equipment fails – whether a weapon, a radar dish, or something more prosaic like a mess hall stove – getting replacement parts can be difficult and time-consuming, and the delay can cause anything from mild inconvenience to serious problems meeting the mission. Larger bas...
Add Favorite
(ISC)2 CCSP | Certified Cloud Security...
The (ISC)² Certified Cloud Security Professional (CCSP) credential to ensures that cloud security professionals have the required knowledge, skills, and abilities in cloud security design, implementation, architecture, operations, controls, and compliance with regulatory frameworks. The CCSP OnDemand is a self-paced learning solution that covers the 6 domains of the CCSP Common Body of Knowledge (CBK) in order to study for the CCSP examin...
Add Favorite
The Role of Digital Technology in Succe...
The Infrastructure Investment and Jobs Act, signed into law in November 2021, will unleash a flood of funding for a vast array of construction projects, including electric grid and energy improvements, roads and bridges, public transit, and water systems to name just a few. It is worth celebrating that so much will be repaired, replaced, or new-built. It also highlights a new opportunity to bring digitization to the construction industry, brin...
Add Favorite
Navigating the Zero Trust Maze
The federal government’s emphasis on cybersecurity for all agencies has had a dizzying effect on the regulatory environment. Agencies must address Executive Order 14028, mandating a zero trust architecture by September 2024. To get there, they must navigate through the General Services Administration’s approved cloud offerings in the Federal Risk And Management Program (FedRAMP). Then there are the National Institute of Standards a...
Add Favorite
Cyber Resilience 2023 - Two Day Virtual...
Ever since the dawn of the internet, its usefulness lies in the data it handles, whether moving it, storing it, or calculating with it. As a result, just as Willie Horton once said he robbed banks because “that’s where the money is,” many of today’s cyber bad actors target agencies’ data because they can monetize it. As a result, cybersecurity is akin to the 20th century Cold War. On the one hand, bad actors ...
Add Favorite
Back to Search Begin New Search