469 past events found
+ 12 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Vision 2024: Getting in a New York (IT)...
The state of New York is emphasizing improving its IT resilience. The state’s 2022-23 strategic plan focuses on moving off legacy systems, implementing an enterprise architecture, and improving service delivery to its residents, to name a few. In addition, the state has its first cybersecurity strategy, and created a Joint Security Operations Center. As the largest city in the United States, New York City has its own technology roadmap,...
May 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
May 6-10, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing the Identity Fabric in the Age...
In the realm of government cybersecurity, the Zero Trust framework stands as a beacon of defense against evolving threats. Central to its efficacy are the principles of identity and access management, which redefine traditional security paradigms. Zero Trust advocates for perpetual verification of users, devices, and resources, emphasizing a “never trust, always verify” mantra. Identity verification, facilitated by multifactor auth...
May 9, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Cyber Summit 2024
Join us virtually May 7, 2024 at 8:30 am ET! Facing attacks of increasing scope, scale, and frequency, today’s public sector cybersecurity leaders are challenged like never before. As they work tirelessly to defend their networks and systems, it’s essential for today’s cyber decision makers to remain mindful of broader trends and capabilities that could help them improve their posture. From establishing and incorporating zero...
May 7, 2024
Organizer: GovExec 360
Location: Virtual
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
April 30 - May 2, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
How Digital Playbooks Propel Federal Mo...
Successful federal modernization requires an artful blend of people, process, and technology—with a relentless focus on enabling business transformation. A “digital playbook” can provide a comprehensive guide to the process, describing both overarching strategy and tactical approaches. Using a templatized technology strategy can boost mission outcomes while humanizing data-driven modernization and leveraging artificial intell...
April 25, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Securing Emerging Tech: Safeguarding th...
Earn 3 continuous learning points (CLPs) in this free IT acquisition training! Join GSA and CISA experts to learn how to Prepare for emerging technology such as quantum computing and Artificial Intelligence Plan for national security implications and threads like an AI directed cyberattack Access GSA’s solutions to stay compliant and mitigate risk! Don't miss this one of a kind learning opportunity, register now!
April 24, 2024
Organizer: GSA
Location: Virtual
Add Favorite
Back to Search Begin New Search