Back to Search Begin New Search Save Search Auto-Notify
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
June 10-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
June 11-13, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
CyberSmart 2024: The More Things Change...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
June 13, 2024
Organizer: FedInsider
Location: Austin, TX
Add Favorite
Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively> Created in response to...
June 13-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
SANS Rocky Mountain Summer 2024
Hands-On Cyber Security Training in Denver Celebrating 35 Years of Cybersecurity Excellence Elevate your expertise with cyber security training at SANS Rocky Mountain Summer 2024 (June 17-22, MT). Led by industry-leading instructors renowned for their deep knowledge and practical insights, this event offers unparalleled, live access to your favorite cyber experts. Filled with hands-on labs, simulations, and exercises designed to equip you with...
June 17-22, 2024
Organizer: SANS Institute
Location: Denver, CO
Add Favorite
Defense One Tech Summit
Technology is reshaping the future of war, from undersea to outer space, and more than ever, commercial companies are shaping technological trends. We'll explore how recent developments in artificial intelligence have upended expectations for AI-powered tools, and how the Pentagon continues to press for advances in a dozen emerging technology areas. Join Defense One’s 9th Annual Tech Summit to learn how innovations of today and tomorrow...
June 18, 2024
Organizer: Defense One
Location: Arlington, VA
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
The ATO and Cloud Security Summit
Join us Thursday, July 11th for GovForward's 6th Annual ATO and Cloud Security Summit! Close the gap! That’s the new policy push for the Federal Risk and Authorization Management Program. FedRAMP was established to help standardize the government’s approach to using cloud service offerings. Between July 2019 and April 2023, agencies increased the number of authorizations by roughly 60 percent, expanding from core infrastructure to...
July 11, 2024
Organizer: GovExec 360
Location: Washington, DC
Add Favorite
Back to Search Begin New Search