Back to Search Begin New Search Save Search Auto-Notify
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
May 12-14, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Cost-Efficient IT Modernization for Sta...
State, local, territorial, and tribal governments in 2025 are navigating a complex landscape of tight budgets, evolving cyber threats, ambitious digital transformation goals, and increased demands for transparency – all while being expected to deliver high-quality citizen services. Central to addressing all these challenges is the reliability and performance of agencies’ IT infrastructure. Without a resilient and observable foundat...
May 13, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
AI FedLab 2025
Join the federal community at AI FedLab for a day of networking and roundtable discussions on AI’s impact on national security, infrastructure modernization and innovation. Participate in interactive sessions covering critical topics such as generative AI, trustworthy AI, data privacy, risk management and cybersecurity to gain actionable insights on the future of AI in government. We are pleased to offer 5.5 continuing professional educa...
May 13, 2025
Organizer: GovCIO Media & Research
Location: Reston, VA
Add Favorite
OT is Not IT
Operational technology (OT) is comprised of the systems and devices used to control and monitor physical processes, often in industrial or critical infrastructure environments and utilizing OEM-proprietary equipment. OT systems are designed to manage machinery, equipment, and processes, ensuring they operate effectively and safely, distinct from IT, which focuses on data processing and information management and uses near-universal standards....
May 14, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Secure by Demand: Proactive Strategies...
The proliferation of mobile apps, both for professional and personal use, has created a massive, often overlooked attack surface. The use of “shadow IT,” software that hasn’t been approved by IT, further increases the risk of data leaks and policy violations at a time when IT teams and resources are stretched thin. With the shift from “Secure by Design” to “Secure by Demand,” trusting software developm...
May 15, 2025
Organizer: ATARC
Location: Webcast
Add Favorite
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
May 15, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Cyber Protection for Unprotected OT Devices
In today's increasingly complex and distributed digital workforce, every organization is faced with the challenge of securing their expanding infrastructure while supporting legacy systems and edge services. Traditional network security models that rely too heavily on rule-based perimeter defenses and simple user authentication are no longer sufficient. There is where the identity and policy-based security model of CSOI (Cybersecurity Operatio...
May 15, 2025
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
May 15-16, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Cybersecurity: Building Resiliency, Red...
Join us as thought leaders from government and industry share how they are managing the cyber defenses of some of our nation’s critical agencies. Government agencies need to strengthen cybersecurity defenses while reducing cost and eliminating unnecessary applications. Agencies seek to gain complete visibility and consolidation of data across multiple sources, both to strengthen their security posture and become more efficient through ap...
May 16, 2025
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search