Mobile Security: A Requirement for Nati...
Mobile devices are a way of life today – including for government agencies. They are ubiquitous, and many agencies have embraced a bring-your-own-device (BYOD) policy that allows employees to use their own. But they have become a rapidly growing target for bad actors – so much so that BYOD could mean “bring your own danger.” For example, in February, SC Magazine reported a phishing campaign targeting the Federal Communi...
March 27, 2024
Organizer:
FedInsider Location:
Webcast
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Managing Disruptive Technologies
Disruptive technology is everywhere and has the ability to disrupt established organizations across the globe. Attendees will learn how to assess the impact of disruptive technology and identify the appropriate safeguards necessary to mitigate risks. They will also learn the appropriate steps to take to adapt the technology and monitor its performance over time. Virtual Summits and the CPE credits you can earn for them are free for ISACA membe...
March 13, 2024
Organizer:
ISACA Location:
Virtual
Stability Analysis of Embankment Dams
This course provides broad coverage of stability analysis for embankment dams. Topics addressed in the course include soil stress-strain behavior, shear strength selection, field, and laboratory testing methods, slope stability analysis methods, slope stability analysis loading cases, seepage as related to stability analysis, and stability rehabilitation methods. The course includes several exercises to reinforce the information presented in l...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
SANS Classic 2024 - Live Online
Learn to combat the world’s latest cyber threats with up-to-the-minute training from real-world practitioners! Make new connections at one of the largest gatherings of professionals in the cyber community this year. Join us Live Online for SANS Classic 2024 - Live Online (Jan 15 - 20). SANS Classic 2024 - Live Online: In-Person or Live Online training Tactical cyber security training taught by experts who work in the industry Hands...
Workiva Amplify Conference
Join us at Workiva Amplify, our annual user conference, to join forces, share knowledge, inspire one another, and find new and better ways to tackle challenges. This year, Amplify is in Nashville, TN and online on September 19th–21st.
Emerging Trends & Best Practices to Com...
Ransomware attacks have become more frequent and sophisticated, causing significant damage and financial loss to businesses of all sizes. According to Verizon’s 2022 data breach report, ransomware attacks saw a 13% increase in the past five years. The first half of 2022 saw nearly 236.7 million ransomware attacks worldwide, and hhe average cost of a ransomware attack was $1.85 million. Statistics reveal that a ransomware attack will occu...
Cloud Security Alliance AI Summit
The Cloud Security Alliance AI Summit brings together experts from around the world to provide key insights on how generative AI can benefit cybersecurity, how malicious attackers are using it and guidelines for responsible usage. The explosive growth of ChatGPT is due in large part to its delivery via the cloud, obligating CSA and its community to take a leading role in articulating the best practices and assurance ecosystem for AI as a Servi...
Securing the Cyber Supply Chain
The Executive Branch has made it clear the United States needs a more resilient and secure supply chain to ensure economic prosperity and national security. The supply chain is only truly secure when all entities throughout the public sector supply chain carry out effective and coordinated security measures to ensure the integrity of supply chain data, the safety of goods, and the security of the respective agency. This virtual workshop will r...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.