Implement the New NIST RMF and Meet 202...
Recently, the National Institute of Standards and Technology (NIST) released the final Risk Management Framework (RMF) standard (SP800-37, Rev 2), an update to the Security Control Baselines (draft SP800-53, Rev 5), and a revision to the NIST Cyber Security Framework (CSF). RMF now requires an additional step, Preparation Step with 18 new Tasks, and the security control baselines families have increased from 18 to 21 to include more privacy an...
Cyber Security Summit: Denver
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. New Date: 9/10/2020 The Fourth Annual Denver Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Full Day Admission includes a Catered Breakfast, Lunch & Cocktail Re...
Auditing Social Media: Avoid A Social M...
Definition: A social media management audit is a series of steps taken to evaluate and optimize critical processes supporting the social media strategy. Performing a social media audit can help any organization to stay on top of its virtual presence. Conducting a social media audit is a key part of managing the operational risks within this social media driven world. This timely, two hour CPE training event is designed for the experienced inte...
Cyber Analytics at Mission Speed
Modern connectivity has transformed government, but also dramatically expanded the attack surface. Agency missions bring unique challenges, and today's adversarial activities are anything but rudimentary. An effective cyber defense strategy depends on finely honed analytics and automation tailored to the network and the mission. And that, in turn, demands a deep understanding of both those mission needs and IT environments -- and the ability t...
Cyber Security Summit: Chicago
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. The Fifth Annual Chicago Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Full Day Admission includes a Catered Breakfast, Lunch & Cocktail Reception, and the eli...
Cyber Security Summit: Dallas
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. New Date: 8/27/2020 The Fifth Annual Dallas Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Full Day Admission includes a Catered Breakfast, Lunch & Cocktail Rec...
Cyber Security Summit: Philadelphia
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. New Date: 8/20/2020 The Second Annual Philadelphia Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Full Day Admission includes a Catered Breakfast, Lunch & Cockt...
Cyber Security Summit: Charlotte
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. The Second Annual Charlotte Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts.
32nd Annual Crimes Against Children Con...
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. Internationally recognized, the Crimes Against Children Conference is the premier conference of its kind providing practical and interactive instruction to those fighting crimes against children and helping children heal. The conference is presented annually by the Dallas Children's Advocacy Center. The conference is conducted to p...
IT Security in Emerging Technology
As federal agencies adopt emerging technologies such as Fifth-Generation Wireless Technology (5G), Artificial Intelligence (AI), the Internet of Things (IoT), and Cloud, they face new challenges in ensuring these technologies can operate securely on their networks. Join the next event in GSA’s Information Technology Category - Emerging Technology Series. This virtual event will bring together government IT security experts to share knowl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.