Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
Cost-Efficient IT Modernization for Sta...
State, local, territorial, and tribal governments in 2025 are navigating a complex landscape of tight budgets, evolving cyber threats, ambitious digital transformation goals, and increased demands for transparency – all while being expected to deliver high-quality citizen services. Central to addressing all these challenges is the reliability and performance of agencies’ IT infrastructure. Without a resilient and observable foundat...
May 13, 2025
Organizer:
FedInsider Location:
Webcast
AI FedLab 2025
Join the federal community at AI FedLab for a day of networking and roundtable discussions on AI’s impact on national security, infrastructure modernization and innovation. Participate in interactive sessions covering critical topics such as generative AI, trustworthy AI, data privacy, risk management and cybersecurity to gain actionable insights on the future of AI in government. We are pleased to offer 5.5 continuing professional educa...
OT is Not IT
Operational technology (OT) is comprised of the systems and devices used to control and monitor physical processes, often in industrial or critical infrastructure environments and utilizing OEM-proprietary equipment. OT systems are designed to manage machinery, equipment, and processes, ensuring they operate effectively and safely, distinct from IT, which focuses on data processing and information management and uses near-universal standards....
May 14, 2025
Organizer:
FedInsider Location:
Webcast
Secure by Demand: Proactive Strategies...
The proliferation of mobile apps, both for professional and personal use, has created a massive, often overlooked attack surface. The use of “shadow IT,” software that hasn’t been approved by IT, further increases the risk of data leaks and policy violations at a time when IT teams and resources are stretched thin. With the shift from “Secure by Design” to “Secure by Demand,” trusting software developm...
May 15, 2025
Organizer:
ATARC Location:
Webcast
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
May 15, 2025
Organizer:
FedInsider Location:
Webcast
Cyber Protection for Unprotected OT Devices
In today's increasingly complex and distributed digital workforce, every organization is faced with the challenge of securing their expanding infrastructure while supporting legacy systems and edge services. Traditional network security models that rely too heavily on rule-based perimeter defenses and simple user authentication are no longer sufficient. There is where the identity and policy-based security model of CSOI (Cybersecurity Operatio...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Cybersecurity: Building Resiliency, Red...
Join us as thought leaders from government and industry share how they are managing the cyber defenses of some of our nation’s critical agencies. Government agencies need to strengthen cybersecurity defenses while reducing cost and eliminating unnecessary applications. Agencies seek to gain complete visibility and consolidation of data across multiple sources, both to strengthen their security posture and become more efficient through ap...
May 16, 2025
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.