Back to Search Begin New Search Save Search Auto-Notify
NASA SEWP SCRM Virtual Forum 2021
Supply Chain Risk Management (SCRM) and Cybersecurity Supply Chain Risk Management (C-SCRM) have gained increased attention recently as several high profile incidents compromised a number of federal systems. In the wake of those incidents, The White House, the Cybersecurity and Infrastructure Security Agency and the National Institute for Standards and Technology have all stepped in to provide new guidance and tools for agencies to improve the...
October 20, 2021
Organizer: Public Sector 360
Location: Virtual
Add Favorite
Facing the Threat of Ransomware
There were more than 2,300 ransomware attacks against all levels of government, healthcare facilities, and schools and higher education institutions in 2020, and the attacks have continued this year. Yet state, local, and education (SLED) organizations are ill-equipped to respond to such attacks, lacking the resources and capabilities to defend against or respond to them. The Cybersecurity and Infrastructure Security Agency has established Sto...
October 13, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
ElevateIT: Houston Technology Summit 2021
Expanding and Evolving within the Digital Revolution At the heart of the Digital Revolution is quick-term, short-term, and long-term growth and profitability. The acceleration of automation development from inception throughout the supply chain will drive customer demands now and in the future. Simply put, companies embracing faster a positive seamless digital customer experience will be the relevant companies for the future. Employing effecti...
October 13, 2021
Organizer: Elevate Events, LLc
Location: Houston, TX
Add Favorite
"Frauditing" Internal Controls for Frau...
"How to prevent and detect corporate fraud!!" Under COSO 2013, Principle 8: "The organization considers the potential for fraud in assessing risks to the achievement of objectives". Corporate fraud is more prevalent today than ever before. Layoffs, pressures, incentives, anonymity, computerization, and lack of privacy are all contributing factors. This CPE event is focused on presenting the internal controls to fraud prevention and detection....
October 12, 2021
Organizer: Corporate Compliance Seminars
Location: Virtual
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for these five one-hour webinars spread over five days,...
October 8, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for five one-hour webinars spread over five days, as tho...
October 7, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Making IT Service Management and Securi...
It’s no secret that getting a clear picture of your hardware, software, and services can be a challenge. Federal IT leaders frequently list vendor audits and unexpected software license true-up as a top concern. Add to the mix – constant adaptation to changing technologies, cyber-attack vulnerability mitigation, and IT asset availability and management in complex hybrid environments – and you start to uncover the challenges i...
October 7, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for these five one-hour webinars spread over five days,...
October 6, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Why Operational Technology and IT Manag...
In today’s traditional Operational Technology (OT) management environment, organizations use outdated software that does not scale to the demands of the modern digital environment. Organizations have struggled to efficiently secure, monitor and manage an Operational Technology environment. This along with a lack of effective systems management leaves OT systems open to significant cyber attack risk and financial impact. How can organizat...
October 5, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for these five one-hour webinars spread over five days,...
October 5, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search