Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive p...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a pr...
Buckeye State Innovation: Leading Tech...
Red Hat is coming to Columbus for a dynamic day of innovation and automation! Discover the latest advancements from industry leaders Red Hat, Dynatrace and F5 as they showcase cutting-edge solutions designed to streamline operations and drive digital transformation. Gain insights into the future of IT automation and learn how these technologies can help your organization achieve efficiency and agility. Discover how Red Hat’s robust open...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
ATARC's Federal Zero Trust Summit
Amidst the ever-shifting digital terrain, federal agencies confront a multitude of cyber challenges, necessitating a proactive stance towards resilience. As cyber threats evolve, agencies must continuously adapt their defenses, remaining vigilant against emerging risks and vulnerabilities. Compliance and regulatory frameworks further complicate the landscape, demanding constant policy refinement to uphold standards and safeguard sensitive info...
October 3, 2024
Organizer:
ATARC Location:
Reston, VA
Palo Alto Networks DHS User Group
Join the Palo Alto Networks DHS User Group on Friday, October 4th at the Carahsoft Conference & Collaboration Center in Reston, VA. We'll discuss the latest federal cybersecurity developments, including a Post-Quantum cryptography overview, and explore how Palo Alto Networks technology can empower your agency to stay secure in the face of evolving threats. A lunch will be provided during the event, where we will also be reviewing OMB M-23-...
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
Government Empowered - Pega
Harnessing technology that prioritizes employees and citizens can unlock new possibilities within government. At Pega’s 7th annual Government Empowered, join government and industry leaders from around the world to discuss how to embrace change and expand what’s possible. Event Highlights:Global Success StoriesIndustry Networking OpportunitiesIndustry Trends and StrategiesGlobal Government AttendanceKeynote Sessions and PanelsHands...
Systems Security Plan - ( NIST Based SSP)
Join this event on using the National Institute of Standards and Technology (NIST) approach for creatin a comprehensive on Systems Security Plan (SSP). This overview event is designed to equip participants with the knowledge and skills needed start the process of development and implementation of an effective security plans for federal information systems. Key Topics Covered: Understanding the NIST security standards and guidelines Implementin...
Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.