Using the Yellow Book for the Governmen...
Enhance Your Government Auditing Skills with the Yellow Book Are you a government auditor looking to enhance your skills and stay up-to-date with the latest industry standards? Look no further than our comprehensive training event designed specifically for government auditors like you. In this training, we aim to provide you with the knowledge and skills necessary to effectively utilize the Yellow Book, also known as Government Auditing Stand...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Closing the Ransomware Gap: Preventing...
With ransomware attacks on the rise, it’s critical to have the right strategies and tools in place to protect your organization’s most sensitive data. In this exclusive session, Julian Weinberger, Field CTO at ShardSecure, will discuss the challenges posed by ransomware attacks and how to effectively close the gap that traditional security measures leave open. You will learn how ShardSecure’s innovative self-healing data tech...
Supply Chain Risk Management and Logistics
Join us for an insightful session on analytics for supply chain risk management in the public sector. Learn how Tableau integrates with logistics, maintenance and parts management systems, utilizing Interos' AI and machine learning enriched data from over 400 million global entities to assess multi-tier supply chain risks. During this webinar, attendees will learn how to:Combine on-premise and external data to identify and mitigate potential b...
Ensuring Operational Resiliency with Pa...
In today's fast-paced digital landscape, operational resiliency is paramount, especially for public sector organizations that serve millions of citizens. Platform outages are inevitable, but the impact on citizen experience and organizational risk can be minimized with the right strategies and tools in place. Join PagerDuty, SCOOP Cyber, and Carahsoft for an insightful webinar where we will explore how PagerDuty's latest innovations can help p...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
The Necessity for Cybersecurity Advance...
In today’s digital landscape, higher education institutions face an increasing array of cybersecurity threats that challenge their ability to protect sensitive information and maintain operational integrity. With students, faculty, and staff relying heavily on digital resources, the potential impact of a cyber incident is significant. Join this webinar to delve into the pressing issue of firewall vulnerabilities, which are often the firs...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.