SANS 2025 Detection and Response Survey...
As cyber threats grow in complexity and frequency, organizations' strategies for detection and response must continuously evolve. The SANS 2025 Detection and Response Survey webcast will delve into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots. By concentrating primarily on endpoints, organizations may narrow their scope and overlook threats emerging from...
Addressing Security Holes in Air Gapped...
As IT and security deployments migrate to the cloud, security gaps in air-gapped systems can be created unless attention focuses on threats such as data transfer from external storage media – for example, USB devices. Paradoxically, many agencies continue to maintain critical systems and data on air-gapped servers or on systems running end-of-life operating systems. The U.S. Department of War maintains critical air-gapped systems even as...
December 3, 2025
Organizer:
FedInsider Location:
Webcast
GSA GWACs for IT Services-Based Solutio...
This is Delegation of Procurement (DPA) Training for all active GWACs Governmentwide Acquisition Contracts (GWACs) enable federal agencies to buy cost-effective, innovative solutions for information technology (IT) requirements from a Best-In-Class (BIC) designated contract vehicle. Because most, if not all, government agencies have a need to buy IT services and solutions, GSA has made this purchasing convenient through its GWAC Programs. In t...
Zero Trust Training | CCZT
CANCELED
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Rebooting The System: Getting Back on T...
The impact of the federal government shutdown on agencies’ IT programs could last for a long time. In the short term, the lack of exposure management means IT systems have become vulnerable due to movement within teams, systems coming off and online, and falling behind on software updates and patches, for instance. Meanwhile, hostile parties are increasing their cyber attacks, raising the risk of major breaches. Other effects, such as mo...
November 20, 2025
Organizer:
Fedinsider Location:
Webcast
Zero Trust Allowlisting
You will learn how to:Align with CISA and NIST CSF 2.0 Zero Trust frameworksUse allowlisting to block unauthorized applications and control what runs in your environmentReduce ransomware risk through proactive endpoint protectionExtend the efficiency of your current security stack
SANS 2025 ICS/OT Survey Webcast ...
Since 2017, the SANS ICS/OT Cybersecurity Survey has been a foundational benchmark for critical infrastructure asset owners and operators. Each year, SANS explores the growing trends in cyber threats, vulnerabilities, and risks across industrial environments, including actionable recommendations for how organizations can improve their security posture. On this webcast, we will explore results from our 2025 survey. We will cover specific topics...
Certificate of Cloud Security Knowledge...
Get Certified in Cloud Security with CCSK v5 Plus Certification TrainingAdvance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with in-depth knowledge and hands-on experience to secure complex clo...
State of Code Webinar Series
Recent projections reveal the staggering cost of poor software quality: over $2.41 trillion annually in the US, with nearly two-thirds attributed to the cybercrime fueled by insecure code. Register for Sonar's State of Code webinar series to learn how their integrated solution for code quality and code security analysis is designed to help software developers reduce this cost and streamline workflows with AI. Join Sonar solution experts online...
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.