Back to Search Begin New Search Save Search Auto-Notify
Zero Trust Implementation
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for Zero Trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
April 20, 2023
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Securing the Cyber Supply Chain
The Executive Branch has made it clear the United States needs a more resilient and secure supply chain to ensure economic prosperity and national security. The supply chain is only truly secure when all entities throughout the public sector supply chain carry out effective and coordinated security measures to ensure the integrity of supply chain data, the safety of goods, and the security of the respective agency. This virtual workshop will r...
February 9, 2023
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Next-Gen Computing Workshop
A recent report from the Center for Strategic and International Studies says the Department of Defense needs to strengthen its software design in order to maintain a competitive edge against foreign adversaries. Harnessing the power of data and analytics remains a critical part of achieving mission goals across all federal agencies. Government organizations need to constantly innovate and strengthen software design in order to stay ahead of th...
January 19, 2023
Organizer: GovExec
Location: Virtual
Add Favorite
FCW Workshop: Cyber Strategies for 2023...
As the government moves increasingly towards digital infrastructure, geopolitical tensions rise, and individuals access more endpoints from more locations than ever before, a strong cyber posture must be embedded in everything agencies do. Policy guidance such as the cyber executive order, NIST’s updated security risk framework, and the Cyberspace Solarium’s recommendations offer strategic direction while tactical playbooks such as...
November 30, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
Continuous Diagnostics and Mitigation (...
The Continuous Diagnostics and Mitigation (CDM) program is a way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to provide government agencies with risk-based cybersecurity solutions to protect federal civilian networks across organizational tiers. Specifically, CDM helps federal agencies identify cybersecurity risks, prioritize those risks, and enable staff to focus on those prior...
November 17, 2022
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Update: Continuous Diagnostics And Moni...
The Continuous Diagnostics and Mitigation (CDM) program is the way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to support government-wide risk-based cybersecurity solutions to assist participating agencies improve their security posture consistently and cost-effectively. In this virtual workshop, government & industry experts will provide the following: a status update on CD...
November 17, 2022
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
Zero Trust: The Fundamentals
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
October 20, 2022
Organizer: Digital Government Institute
Location: Virtual
Add Favorite
New Domains in Cybersecurity T&E
Cybersecurity is paramount in every phase of a system lifecycle. Professionals involved in Test and Evaluation are increasingly tasked with more rigorous controls, more complicated interconnections, and more contested operating environments. Cybersecurity is applied across all Government domains from common tactical networks to weapon systems. Instead of focusing on the depth of cybersecurity T&E in a single space, this workshop will focus...
October 18-20, 2022
Organizer: International Test & Evaluation Association
Location: Destin, FL
Add Favorite
FCW Workshop: Supply Chain Risk Management
In a digital world where almost everything is connected, protecting the supply chain of products becomes even more critical to protecting the security of the data, the networks, and the people using those products. Several high-profile breaches have been linked to supply chain issues, and agencies have received multiple policy directives and guidance as they work to secure their large attack surfaces. A number of tools are now available to hel...
September 21, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
September 15-16, 2022
Organizer: Corporate Compliance Seminars
Location: Dulles, VA
Add Favorite
Back to Search Begin New Search