Back to Search Begin New Search Save Search Auto-Notify
Protecting Critical Infrastructure with...
Modern cybersecurity measures such as post-quantum cryptography (PQC) and zero trust architecture (ZTA) are essential to protect U.S. critical infrastructure and ensure a resilient nation. And with a flurry of comprehensive initiatives coming from the Executive Branch, Pentagon, NSA, and NIST, it can be challenging for U.S. government CIOs and CISOs to determine where to prioritize resources. But PQC and ZTA aren’t mutually exclusive: ef...
June 22, 2023
Organizer: ATARC
Location: Virtual
Add Favorite
Next-Gen Computing Workshop
A recent report from the Center for Strategic and International Studies says the Department of Defense needs to strengthen its software design in order to maintain a competitive edge against foreign adversaries. Harnessing the power of data and analytics remains a critical part of achieving mission goals across all federal agencies. Government organizations need to constantly innovate and strengthen software design in order to stay ahead of th...
January 19, 2023
Organizer: GovExec
Location: Virtual
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
December 12-14, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
November 7-9, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
CyberWeek 2022
CYBERSCOOP PRESENTS CYBERWEEK Join over 10,000 influential leaders from the cybersecurity community at CyberWeek, the nation’s largest week-long cybersecurity festival focused on digital threats, best practices and the U.S. government’s work on improving cyberspace. CyberWeek is an annual movement bringing together top C-Suite leaders from major technology companies, state and federal government agencies, and other influential deci...
October 17-21, 2022
Organizer: CyberScoop
Location: Virtual
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
September 19-21, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
August 8-10, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
March 21-23, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Priority 1: Strengthening and Empowerin...
The President’s Management Agenda’s three-pronged vision outlines specific changes to the Federal government’s workforce, customer experience, and management of businesses. Priority 1’s focus on the American workforce challenges government agencies to become model employers in terms of diversifying their workforce and the support they provide those employees. Recruiting and retaining the best and brightest means ensurin...
February 10, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
"Frauditing" Internal Controls for Frau...
"How to prevent and detect corporate fraud!!" Under COSO 2013, Principle 8: "The organization considers the potential for fraud in assessing risks to the achievement of objectives". Corporate fraud is more prevalent today than ever before. Layoffs, pressures, incentives, anonymity, computerization, and lack of privacy are all contributing factors. This CPE event is focused on presenting the internal controls to fraud prevention and detection....
December 14, 2021
Organizer: Corporate Compliance Seminars
Location: Virtual
Add Favorite
Back to Search Begin New Search