Back to Search Begin New Search Save Search Auto-Notify
From Data to Decisions: Secure Controll...
Explore the critical role of Multi-Enterprise Spanning Architecture (MESA) in helping to enable controlled collaboration and securing sensitive information across mission partners.
November 13, 2024
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Innovation Summit: Riding the Wave of T...
While the IT universe has always been a rapidly evolving environment, it often has changed in an expected way – more speed, more capacity, less latency, for example, building on what came before. Occasionally, however, disruptive new technology or a major strategic shift in thinking is introduced and it takes a long time for the reverberations to be absorbed and the ecosystem to adjust to the new circumstances. Over the past three years,...
November 14, 2024
Organizer: FedInsider
Location: Washington, DC
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
November 14-15, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CyberSmart 2024: Cybersecurity Excellen...
The premise of Moore’s law is that the speed and capability of computers can be expected to double every two years. Unspoken but implied is that new technologies will be introduced at a similar clip – along with new, sometimes unforeseen, challenges. Cybersecurity professionals know all about Moore’s law. For instance, the past 18 months has brought artificial intelligence (AI) into the mainstream, introducing plenty of both...
November 15, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
November 19, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
November 19, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Increase Your Speed and Agility with IT...
Join us for an insightful webinar designed to help you increase your speed and agility in navigating the International Traffic in Arms Regulations (ITAR) through the strategic use of exemptions. This session will provide participants with practical strategies and expert guidance to streamline compliance processes, accelerate approvals, and enhance operational efficiency while staying fully compliant with ITAR requirements. In this special one-...
November 19, 2024
Organizer: Content Enablers
Location: Webcast
Add Favorite
The GovExec Cybersecurity Futures Forum
The cybersecurity landscape for U.S. federal and defense sectors is evolving rapidly amid technological advancements and increasingly sophisticated threats. These organizations face unprecedented challenges in safeguarding sensitive data and critical infrastructure from adversaries who exploit evolving vulnerabilities. As federal networks expand into cloud computing, IoT, and interconnected systems, the attack surface broadens, necessitating r...
November 20, 2024
Organizer: GovExec
Location: McLean, VA
Add Favorite
CMMC Level 3 Implementation
This CMMC training event is designed to equip participants with the knowledge and skills necessary to effectively implement the Level 3 practices outlined in 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels within the Cybersecurity Maturity Model Certification (CMMC). Key Points: CMMC Levels: The CMMC model will encompass five maturity levels, with Level 3 being an adv...
December 2, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
December 2, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Back to Search Begin New Search