Election Security: Security is Top-of-M...
The 2020 election and its aftermath provided a vivid demonstration of many of the risks faced by election officials across the country – and new dangers have emerged in 2024. Physical threats to poll workers have proliferated, AI-generated disinformation showed up in one state’s primary contest, and other AI threats, whether from partisan interests, corporate disinterest or hostile nation-states, loom large. The landscape is so dan...
September 26, 2024
Organizer:
FedInsider Location:
Webcast
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mit...
Transforming Public Sector Leadership w...
In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. For instance, using data gathered on water quality can be used for planning and designing environmental interventions to keep pollutants out of groundwater. Many agencies may implement data-driven decisions to improve citizen services, cutting down on response times and improving the quality of those servic...
September 30, 2024
Organizer:
FedInsider Location:
Webcast
AI Promises to Unlock Research Potentia...
The federal government is doing everything it can to encourage agencies to adopt artificial intelligence tools to improve all aspects of their performance, while simultaneously paying close attention to potential risks of this exciting new technology. Currently, few agencies have adequate access to supercomputers and the deep expertise needed to operate the technology and test potential applications on secure infrastructure. This is beginning...
October 2, 2024
Organizer:
FedInsider Location:
Webcast
ATARC's Federal Zero Trust Summit
Amidst the ever-shifting digital terrain, federal agencies confront a multitude of cyber challenges, necessitating a proactive stance towards resilience. As cyber threats evolve, agencies must continuously adapt their defenses, remaining vigilant against emerging risks and vulnerabilities. Compliance and regulatory frameworks further complicate the landscape, demanding constant policy refinement to uphold standards and safeguard sensitive info...
October 3, 2024
Organizer:
ATARC Location:
Reston, VA
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
October 3, 2024
Organizer:
FedInsider Location:
Austin, TX
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.