Back to Search Begin New Search Save Search Auto-Notify
Securing AI: Cybersecurity Operations/S...
Join us for our new two-day, interactive global workshops focused on identifying opportunities and managing the risks associated with artificial intelligence. Engage with your peers as we take an in-depth, hands-on look at how to secure the use of AI and discover ways AI uses our data through a practical risk management lens. Securing AI: Cybersecurity OperationsGain essential tools to secure systems in the AI era. Learn how AI can impact both...
June 20-21, 2024
Organizer: ISC2
Location: Denver, CO
Add Favorite
INTERFACE Phoenix 2024
Welcome to INTERFACE Phoenix 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
June 21, 2024
Organizer: F2F Events, Inc.
Location: Scottsdale, AZ
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Boosting Data Security & Cyber Resilien...
All the elements of the U.S. healthcare system are under siege by hackers. A recent article in Modern Healthcare reported that “[o]ver the past five years, there’s been a 256% increase in large breaches reported to [the U.S. Department of Health and Human Services] involving hacking and a 264% increase in ransomware.” Federal health agencies face the same risks – and private-sector attacks ripple through the agencies, a...
July 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
INTERFACE Salt Lake City 2024
Welcome to INTERFACE Salt Lake City 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate,...
July 11, 2024
Organizer: F2F Events, Inc.
Location: Salt Lake City, UT
Add Favorite
The ATO and Cloud Security Summit
Join us Thursday, July 11th for GovForward's 6th Annual ATO and Cloud Security Summit! Close the gap! That’s the new policy push for the Federal Risk and Authorization Management Program. FedRAMP was established to help standardize the government’s approach to using cloud service offerings. Between July 2019 and April 2023, agencies increased the number of authorizations by roughly 60 percent, expanding from core infrastructure to...
July 11, 2024
Organizer: GovExec 360
Location: Washington, DC
Add Favorite
Beyond Traditional Boundaries: Moderniz...
While the Personal Identity Verification (PIV) and Common Access Card (CAC) represent a high assurance, technically interoperable, and a highly regulated method of authentication, they suffer from factors such as ease of use, ability to work with mobile devices and across devices. Office of Management and Budget (OMB) memorandum M-19-17, Enabling Mission Delivery Through Improved Identity, Credential, and Access Management, opened the door for...
July 11, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Back to Search Begin New Search