CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Cyber Summit 2024
Join us virtually May 7, 2024 at 8:30 am ET! Facing attacks of increasing scope, scale, and frequency, today’s public sector cybersecurity leaders are challenged like never before. As they work tirelessly to defend their networks and systems, it’s essential for today’s cyber decision makers to remain mindful of broader trends and capabilities that could help them improve their posture. From establishing and incorporating zero...
SOF Week 2024 Executive Briefings Serie...
Rubrik and Carahsoft are excited to invite you to join us for our SOF Week 2024 Executive Briefing Series! Cyber attacks and threat actors are on the rise. When traditional security measures fall short, the protection of mission-critical data is of paramount importance. Rubrik implements innovative approaches and data resilience tactics in an ever-changing digital landscape. Rubrik has recently partnered with DoD agencies to recover swiftly fr...
Bringing Digital Transformation to Fede...
The Office of Inspector General (OIG) serves as the internal watchdog for all federal departments and agencies. The 74 inspectors general are broadly responsible for preventing and detecting fraud, waste, abuse, misconduct, and mismanagement in their domains, and promoting economy, efficiency, and effectiveness in operations and programs. The Department of Health and Human Services OIG, for instance, employs more than 1,600 public servants to...
May 8, 2024
Organizer:
Fedinsider Location:
Reston, VA
Election Security: Protecting the Found...
Administering elections falls on the shoulders of state and territorial governments. It is not surprising, then, that there are so many different approaches, technologies, and processes in place to handle election infrastructure. The problems that befall election infrastructure are many, varied, and often well publicized. In Maricopa County, Ariz., ballots were too lightly printed to be read by scanners during the 2022 midterms. Multnomah Coun...
May 9, 2024
Organizer:
FedInsider Location:
Webcast
SANS Security West San Diego 2024
Come to San Diego for Serious Cyber Security Training Celebrating 35 Years of Cybersecurity Excellence at SANS Security West 2024 Take the necessary steps to defend your organization from external threats before a breach occurs. Join us in San Diego, CA, for an immersive learning experience from May 9-14 (PT). As cyber threats evolve, so must your skills. This is your chance to learn, network, and advance your career with the industry's foremo...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Securing the Path Forward: Open-Source...
Title: Securing the Path Forward: Open-Source Software Solutions for Modern Challenges Abstract: In today's tech landscape, securing open-source software (OSS) is crucial due to rising supply chain vulnerabilities, particularly in AI and for budget-conscious organizations that value OSS for its flexibility, cost-effectiveness, and innovation. However, if not carefully managed, OSS also poses significant security challenges and risks to softwar...
Navigating CMMC Compliance: The Integra...
The recent notice of proposed rulemaking for the Cybersecurity Maturity Model Certification (CMMC) program made one thing for certain: the U.S. Department of Defense is serious about external service provider (ESP) security. Under the proposed regulation, U.S. defense contractors will need to pay close attention to their Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) who qualify as ESPs to ensure they also ach...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.