Back to Search Begin New Search Save Search Auto-Notify
Strategies for Rapid Digital Modernization
Many agencies are looking for ways to advance their modernization efforts while reducing risk, maximizing cost efficiency, and increasing speed to deployment. With modernization at the forefront of improving customer experience, it’s paramount to understand how to accelerate digital transformation through actionable strategies. On June 11, join GovExec TV and Maximus for a deep dive into digital modernization. Explore the “digital-...
June 11, 2024
Organizer: Maximus
Location: Virtual
Add Favorite
Cybersecurity Division Meeting
Cybersecurity continues to be one of the fastest-moving policy topics for contractors in the public sector market. To stay up to date on the latest contractor requirements, join the NDIA Cybersecurity Division for our bi-annual meeting slated for June 10, 2024, to get updates from our Committees on Legal and Policy issues, Software Assurance, Cybersecurity Standards, and Supply Chain Risk Management. Join colleagues and counterparts as we hear...
June 10, 2024
Organizer: NDIA - National Defense Industrial Association
Location: Alexandria, VA
Add Favorite
Cybersecurity Trends for Midsize Enterp...
Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver services with small teams and limited budgets. Across industries, MSE IT budgets average 4.9% of annual revenue, but only 5% of the IT budget is dedicated to security. The need to create a strong, mature security posture remains. Join this complimentary Gartner security and risk webinar as Gartner experts explore the top trends that MSE IT leaders r...
June 10, 2024
Organizer: Gartner
Location: Webcast
Add Favorite
ISC2 CISSP® Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
June 2-7, 2024
Organizer: Infosec
Location: San Diego, CA
Add Favorite
How to Use AI Responsibly
AI has the power to transform the way governments work. However, that transformative power poses risks and is rife with the potential for misuse. To harness AI’s power ethically, agencies need to invest in responsible AI practices. Join us online Wednesday, June 5 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government and industry leaders about the attributes associated with responsible AI and how to use it effectively at your orga...
June 5, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
Consolidation with CrowdStrike
Evolving cyber threats are making an enterprise-wide impact on organizations, forcing business leaders to make complex decisions about the future of their security program and overall strategy. Many organizations have adopted countless security tools, resulting in a disconnected, disjointed security stack that causes operational distress, burns a hole in their pocket and even puts them at further risk because adversaries thrive in complexity....
June 5, 2024
Organizer: CrowdStrike Government Team at Carahsoft
Location: Webcast
Add Favorite
How To Upgrade Your Cybersecurity Risk...
Everyone looks forward to and loves an upgrade. An upgrade to a suite in a hotel or an upgrade to first class for a flight always makes for a much more enjoyable trip. What would it look like to upgrade your Cybersecurity risk assessment capabilities? As an essential element to support your cybersecurity program, performing cybersecurity risk assessments is critical for organizations of all sizes and sectors. With cyber threats evolving in com...
June 4, 2024
Organizer: SANS Institute
Location: Webcast
Add Favorite
Wireless Insider Threat
In our ever-connected world, wireless devices have transformed how we communicate. However, despite their ubiquity, wireless devices are still susceptible to insider threats. And with the September 30, 2024 deadline to implement Wireless Intrusion Detections for SCIFs and SAPFs quickly approaching, now is the time to learn how to reduce your risk. Insider threat expert Shawnee Delaney, joined by Bastille CTO Dr. Brett Walkenhorst, will shed li...
June 4, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
May 30-31, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Back to Search Begin New Search