Back to Search Begin New Search Save Search Auto-Notify
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
June 10-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
June 11-13, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively> Created in response to...
June 13-14, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
SANS Rocky Mountain Summer 2024
Hands-On Cyber Security Training in Denver Celebrating 35 Years of Cybersecurity Excellence Elevate your expertise with cyber security training at SANS Rocky Mountain Summer 2024 (June 17-22, MT). Led by industry-leading instructors renowned for their deep knowledge and practical insights, this event offers unparalleled, live access to your favorite cyber experts. Filled with hands-on labs, simulations, and exercises designed to equip you with...
June 17-22, 2024
Organizer: SANS Institute
Location: Denver, CO
Add Favorite
Seepage Through Earth Dams
This introductory course is designed to be a participatory, interactive workshop, which will cover the basic elements required to understand and evaluate seepage-related issues for earth dams. The course begins with providing an understanding of why seepage mechanisms in earth dams are important to dam safety. Information on seepage mechanics, including permeability and erodibility will then be presented. The presentations will then progress t...
June 18-21, 2024
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
AI & ML in Records Management
Artificial Intelligence (AI) and Machine Learning (ML) are rapidly changing the way records managers track the data they have, from where it is located to who can access it to what information it contains. These technologies are also changing how agencies meet compliance requirements. In this virt ual workshop, we break down these concepts and show the potential benefits to your agency. You will leave with a better understanding of how AI/ML c...
June 20, 2024
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Protecting APIs and Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
June 26, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Neurodiversity in Cybersecurity Summit 2024
As the cybersecurity talent shortage persists, with an estimated 700,000 unfilled jobs, the industry needs to redouble its efforts to attract and retain workers. One important way to accomplish this is by recognizing that jobs and workplaces can’t be “one size fits all.” As many as 20% of adults are neurodivergent (ND), and when we fail to account for the unique strengths, experiences, and challenges of neurodivergent cyberse...
June 27, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Pittsburgh Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
July 11, 2024
Organizer: FutureCon
Location: Pittsburgh, PA
Add Favorite
Back to Search Begin New Search