Back to Search Begin New Search Save Search Auto-Notify
Seepage Through Earth Dams
This introductory course is designed to be a participatory, interactive workshop, which will cover the basic elements required to understand and evaluate seepage-related issues for earth dams. The course begins with providing an understanding of why seepage mechanisms in earth dams are important to dam safety. Information on seepage mechanics, including permeability and erodibility will then be presented. The presentations will then progress t...
June 18-21, 2024
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
Military-Friendly Virtual Job Fair
This Corporate Gray Virtual Military-Friendly Job Fair provides military-experienced job seekers the opportunity to meet with employers nationwide via text chat and video interviews. Virtual Job Fair hours are 11:00 AM to 2:00 PM (ET). This event is especially for transitioning service members, veterans, and military spouses. Civilian job seekers welcome. All job seekers are required to pre-register and upload their resume to participate in th...
June 20, 2024
Organizer: Competitive Edge Services, Inc. dba Corporate Gray
Location: Virtual
Add Favorite
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
5 Management Mistakes to Avoid
Stepping into a new management or supervisory role can be daunting. As you navigate new teams and relationships, it can be stressful to figure out all the things you should do as a supervisor on a daily basis. So instead, we’re focusing on the top five things you should avoid doing as a government supervisor. Join us online Monday, June 24 from 4-4:30 p.m. ET/1-1:30 p.m. PT to hear from a government expert about the top mistakes managers...
June 24, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Big Data, Big Challenges: How Governmen...
Data is the biggest asset of modern organizations. But thanks to an increase in data breaches, evolving privacy regulations, and litigation volumes, data can also be an organization’s biggest liability. Good data governance is critical to government agencies’ ability to effectively respond to requests for data and reduce their overall risk. Join us online Tuesday, June 25 from 2-2:50 p.m. ET/11-11:50 a.m. PT to hear from government...
June 25, 2024
Organizer: GovLoop
Location: Virtual
Add Favorite
Understanding Your Survivor Benefits
This Session Covers An Overview of FERS & CSRS Survivor Benefits Differences between the two retirement systems’ survivor benefits Qualifying relatives Cost of electing survivor benefits What forms should be filled out to ensure qualifying relatives receive the survivorship Other Information for FERS & CSRS Annuitants Spousal Survivor annuities (including former spouses) Cost to give an insurable interest survivor annuity Informa...
June 26, 2024
Organizer: Serving Those Who Serve
Location: Webcast
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Haystack CTF: The Hunt for IOC's
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss! An up-and-coming hacker prodigy known as Leopold falls into debt with The League after unsuccessfully trying to hack into The League's network to exploit th...
June 27, 2024
Organizer: World Wide Technology
Location: Virtual
Add Favorite
Neurodiversity in Cybersecurity Summit 2024
As the cybersecurity talent shortage persists, with an estimated 700,000 unfilled jobs, the industry needs to redouble its efforts to attract and retain workers. One important way to accomplish this is by recognizing that jobs and workplaces can’t be “one size fits all.” As many as 20% of adults are neurodivergent (ND), and when we fail to account for the unique strengths, experiences, and challenges of neurodivergent cyberse...
June 27, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Back to Search Begin New Search