Back to Search Begin New Search Save Search Auto-Notify
ICIT 2021 Fall Briefing-- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
November 30, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
"Frauditing" Internal Controls for Frau...
"How to prevent and detect corporate fraud!!" Under COSO 2013, Principle 8: "The organization considers the potential for fraud in assessing risks to the achievement of objectives". Corporate fraud is more prevalent today than ever before. Layoffs, pressures, incentives, anonymity, computerization, and lack of privacy are all contributing factors. This CPE event is focused on presenting the internal controls to fraud prevention and detection....
November 30, 2021
Organizer: Corporate Compliance Seminars
Location: Virtual
Add Favorite
ATARC Digital Services Virtual Summit
Digital Services Centers aim to help agencies modernize their IT portfolios in a more disciplined, well-managed, and controlled manner. Listen to topic experts discuss how a “lean factory” approach can accelerate product development to meet mission requirements. In today’s digital age, as our workforce is transforming into a hybrid environment, many Federal Agencies are experiencing problems and challenges. Hear as topics exp...
November 30, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
ICIT 2021 Fall Briefing -- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
November 23, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Using Digital Transformation to Improve...
There are so many changes rippling through the healthcare sector, it is easy to forget that the point of introducing innovative new technologies is to provide better outcomes for patients. Digital transformation can enable healthcare providers and researchers to make better-informed decisions on everything from what factors contribute to cancer to treating and preventing the spread of emerging novel diseases such as COVID-19. Programs such as...
November 18, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
FCW Workshop: Workforce
With aging IT infrastructure, outdated job classification system and a greying government workforce, agency executive and human capital officers face a trifecta of challenges in the years ahead. Soaring demand for cybersecurity experts and data scientists are just two examples of the newer professional specialists that the government is struggling to hire. With the rise of vaccinated workers, questions have arisen about the reopening of federa...
November 17, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
Agency in Motion: DISA's Hybrid Workfor...
The Defense Information Systems Agency is, in many ways, the point of the cyber spear for the Department of Defense. It’s responsible for conducting network operations across all of DOD’s warfighting domains to ensure warfighters’ effectiveness and lethality.Maintaining that sharp edge during the pandemic has required DISA to adjust and evolve its own operations while assisting Defense agencies to ensure their operations cont...
November 15, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Government Guide to Zero Trust | Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Executive Order includes directives to CISA and GSA to develop a cloud security strategy and provide guidance to agencies for implementation.Address...
November 10, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
"Frauditing" Internal Controls for Frau...
"How to prevent and detect corporate fraud!!" Under COSO 2013, Principle 8: "The organization considers the potential for fraud in assessing risks to the achievement of objectives". Corporate fraud is more prevalent today than ever before. Layoffs, pressures, incentives, anonymity, computerization, and lack of privacy are all contributing factors. This CPE event is focused on presenting the internal controls to fraud prevention and detection....
November 9, 2021
Organizer: Corporate Compliance Seminars
Location: Virtual
Add Favorite
A Government's Guide to Zero Trust Day...
As part of its risk mitigation strategy, the Cybersecurity Executive Order issued by the White House in May moves Zero Trust architecture to the center of cyber hygiene policy for the federal government. Zero Trust can be summarized easily: Trust nothing, suspect everything, authenticate 100%. The Cybersecurity and Infrastructure Security Agency views this as setting an example for state and local governments looking to strengthen their securi...
November 9, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search