Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively> Created in response to...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
CyberSmart 2024: The More Things Change...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
June 13, 2024
Organizer:
FedInsider Location:
Austin, TX
Defend Smarter: Leveraging AI to Maximi...
Are you struggling to keep up with ever increasing security compliance and regulatory requirements? Is your team tired of manually intensive and labor some work for keeping up compliance efforts? Unlock the potential of automated and continuous security compliance and risk management to fortify your organization's defenses. Join us to learn more about: Regulations and industry standards driving cybersecurity efforts in the public sector Pain...
Piercing the Near-Peer Cyber Perimeter:...
In today's world, protecting national security requires understanding the global cyber operations landscape, particularly the activities of Great Powers countries. SpyCloud's Identity Intelligence offers a unique perspective into this challenging space, helping to uncover the tactics and trends used by advanced actors. This event will showcase an in-depth analysis of compromised data, revealing connections beyond traditional near-peer threats....
Bridging Zero Trust and Insider Risk Ma...
As federal agencies adhere to the Zero Trust mandate, the incorporation of insider risk management within its framework is imperative. This fusion is particularly critical amidst today's evolving threat landscape, as the federal government bolsters its cybersecurity posture. We invite you to join our webinar as we explore the intricate and powerful combination of Zero Trust and insider risk management! During this session, our speakers will: I...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
Generative AI: Uses and Abuses in Cyber...
As organizations around the globe grapple with the implications of Generative AI (GAI) in cybersecurity, we recognize the importance of understanding its true impact and potential vulnerabilities. With the rise of GAI in both legitimate and malicious contexts, it is crucial to discern between hype and reality. This webinar, hosted by Trend Micro and Carahsoft, aims to delve into the nuances of GAI, particularly focusing on its utilization by...
Cohesity Cyber Incident Workshop
Joining Cohesity for an exclusive half-day workshop, participants will be guided through a comprehensive cyber event simulation. Throughout the workshop, they will triage, diagnose, and respond to simulated cyber threats, reflecting on the incident response process and exchanging perspectives and best practices with experts and fellow participants in Operation Stormfall. It's not just about preparedness; it's about empowerment, as atte...
Kansas City Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
June 6, 2024
Organizer:
FutureCon Location:
Kansas City, KS
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.