Back to Search Begin New Search Save Search Auto-Notify
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
October 15, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
The Road to Making AI Real: A Year in R...
It has been one year since the issuance of the Executive Order on AI, and the landscape continues to evolve rapidly. Federal agencies have been hard at work gaining mission-oriented outcomes from pilots, while trying to identify and navigate through the challenges of operationalizing AI at scale. For many departments, the leap into the world of artificial intelligence (AI) may seem like a bridge too far. Even those with well-resourced data sys...
October 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Bringing Together Cloud Flexibility ...
The rise of artificial intelligence has led agencies to seek out hybrid cloud infrastructure that accelerates AI application development and delivers faster time to value. AI solutions also have varying storage requirements based on their design – another reason that hybrid cloud solutions can optimize AI applications. At the same time, hybrid cloud environments create complexities that must be managed, ranging from ensuring that hybrid...
October 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Adding System Observability to Monitori...
Government agencies at all levels are under pressure to modernize their IT infrastructure to meet the evolving needs and expectations of their customers, stakeholders, and employees. The ubiquity of smart phones and tailored apps in the broader world have raised user expectations for government systems to work the same way. Modernization certainly presents a host of opportunities to improve agencies’ performance, but it comes with its ow...
October 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
October 7, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
5G as a Digital Transformation Accelerant
The United States leads the world in adopting 5G technology for communications and wireless internet access, thanks to its high speed, low latency, and increased bandwidth access. This has provided a huge boost to digital transformation in both the public and private sectors. For instance, the rapid adoption of edge computing can be attributed to 5G’s superior qualities. The spread of 5G was accelerated by the pandemic, as agencies and b...
October 7, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
October 3, 2024
Organizer: FedInsider
Location: Austin, TX
Add Favorite
AI Promises to Unlock Research Potentia...
The federal government is doing everything it can to encourage agencies to adopt artificial intelligence tools to improve all aspects of their performance, while simultaneously paying close attention to potential risks of this exciting new technology. Currently, few agencies have adequate access to supercomputers and the deep expertise needed to operate the technology and test potential applications on secure infrastructure. This is beginning...
October 2, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
September 30, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mit...
September 30, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Back to Search Begin New Search