Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
CMMC Level 2 Implementation
The CPE training event is designed to provide participants with the knowledge and skills necessary to implement the Level 2 practices based on 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels of cybersecurity maturity within the CMMC model. It is mandatory for all certified organizations to complete the Level 2 practices. This event should be attended as the CMMC progra...
All Day DevOps (ADDO): Sonatype Watch Party
All Day DevOps (ADDO) is the world's largest DevOps conference, happening this October. Industry leaders and developers from around the world will share their insights, innovations and best practices in the ever-evolving world of open source! We'd like to invite you to our fun-filled viewing party experience in Reston, VA! Join Sonatype and Carahsoft's watch party on October 10th for:Forward-Thinking Sessions: Dedicated tracks for developers,...
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
Dam Construction Inspection
This course serves as an introduction and guidance on construction oversight and inspections associated with the construction or modification of a dam and appurtenant structures. Learning objectives attendees will receive from this course: Organization, communication, and the roles, responsibilities, and authority of project team members. Emergency operations for dam and levee failures and incidents. Importance of dam construction documentatio...
INTERFACE Spokane 2024
Welcome to INTERFACE Spokane 2024! IT Infrastructure is constantly changing, bringing new challenges every day. From ransomware and the latest security threats to the need for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educate, advise...
Google Public Sector Summit
The role of AI in responding to security threats has taken on new urgency as agency leaders grapple with AI's emergence into mainstream business applications. However, threat actors are moving just as quickly to capitalize on AI to advance their attacks.Secure your spot at the Google Public Sector Summit on Wednesday, October 16 to hear how agency and industry experts are approaching the widening intersection of AI and security. You'll hear fr...
Government Empowered - Pega
Harnessing technology that prioritizes employees and citizens can unlock new possibilities within government. At Pega’s 7th annual Government Empowered, join government and industry leaders from around the world to discuss how to embrace change and expand what’s possible. Event Highlights:Global Success StoriesIndustry Networking OpportunitiesIndustry Trends and StrategiesGlobal Government AttendanceKeynote Sessions and PanelsHands...
F5 Red Hat Tech on Tap
Application and API security are rapidly evolving. Faced with new challenges that span traditional on-premise data centers, distributed multi-cloud environments, and legacy versus modern application deployments, the DoD requires flexible solutions to rapidly address a surging attack vector and an expanding threat landscape. On this Tech on Tap tour stop, we will focus on these new security threats and provide you with real-world examples of so...
Small Business Alliance Event - FY25 IT...
The Information Technology Category and the Category Management Program Management Office are co-hosting the first annual IT Government-wide IT Category Forum on October 17, 2024 to highlight agency BIC contracts and teach participants the value of BIC category management principles. The IT Government-wide Category has partnered with and is coordinating with ACT-IAC on an FY25 IT Government-wide Category Forum, intended to be an in-person even...
October 17, 2024
Organizer:
ACT-IAC Location:
Reston, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.