Airlines and Airports: Visibility Acros...
Airports are some of the most complex and interconnected environments in the world — blending IT, OT, and IoT systems across everything from baggage handling and lighting, to fueling and passenger operations. As these systems become more connected, the risk of cyber disruption grows. A single OT outage can ground flights, disrupt services, and cost millions. Join us to explore how airports can achieve real-time visibility and strengthen...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Government Innovation California
California continues to lead the nation in digital government, investing heavily in modern infrastructure, data programs, and cyber resilience. Yet agencies still face persistent challenges—from legacy systems and siloed decision-making to workforce skill gaps, fragmented data governance, and increasing pressures around cybersecurity, AI governance, and public trust. Addressing these complex issues requires shared learning, practical ups...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification Training Advance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
2nd Annual AFCEA Silicon Valley Cyber ...
Join us for the 2nd Annual AFCEA Silicon Valley Cyber & IT Summit as we bring together industry leaders, innovators, and experts in the fields of cybersecurity and information technology. Set to take place on Thursday, February 5, 2026 in the heart of Silicon Valley on Moffett Field at the 63rd Readiness Division Building, this summit promises to be a unique opportunity for networking, learning, and collaboration. All those who are interes...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Reassessing Modernization Priorities
The recent pause in government operations has given agencies an opportunity to step back and reassess their modernization priorities. As federal IT leaders plan for 2026, many are taking a fresh look at their portfolios—reevaluating risk, reestablishing momentum on paused initiatives, and sharpening their focus on resilience, security, and mission impact. Rather than slowing progress, the pause created space for agencies to uncover hidde...
February 11, 2026
Organizer:
FedInsider Location:
Webcast
Winter Cyber Solutions Fest 2026: Utili...
Cyber risk in industrial environments carries consequences far beyond data loss—it can disrupt essential services, damage equipment, impact safety, and affect entire communities. In the utilities sector, this risk is operational, immediate, and escalating. Water treatment plants, electric grids, and energy distribution networks are now routine targets for adversaries seeking to exploit weaknesses in industrial control systems with tradit...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.