Overview of the NIST Cybersecurity Fram...
Join us for a 2 CPE event that provides an overview of the NIST Cybersecurity Framework (CSF) 2.0. This framework is designed to help organizations better manage and reduce cybersecurity risks by utilizing existing standards, guidelines, and practices. During this event, participants will gain valuable insights into the key concepts and components of the CSF 2.0. Learn how the framework integrates lessons learned from recent technology advanc...
The Strategic 8: How to Navigate the Cu...
No matter your industry, protecting your data and operations is paramount. Cloud security is crucial for every organization to protect their cloud environment, but it can be tricky to fully protect yourself in a constantly evolving threat landscape. For true peace of mind, you need to follow best practices and build these into your security protocol. When you follow the best practices, you will not only harden your organization’s cloud s...
September 18, 2024
Organizer:
Cloud Cover Location:
Webcast
Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
The Global Impact of AI: Differences in...
AI adoption differs significantly across industries, countries and even continents. Join us in this session as Ramesh Dontha and guests deep dive into the different applications of AI on a global scale.
Impact of AI on the Cybersecurity Indus...
Artificial intelligence (AI) has bolstered cybersecurity solutions across the board. Security teams have more ways to detect advanced threats than ever before, and organizations are much better equipped to measure and reduce their attack surfaces. However, AI also benefits cyber adversaries with improved phishing and spear phishing techniques and new methods for tricking unsuspecting victims using deepfake content spawned by generative AI. Joi...
September 25, 2024
Organizer:
ISC2 Location:
Webcast
Dell Technologies Webinar Series 2024-2025
In this Dell Technologies Webinar Series, attendees will learn about: AI & Generative AI Edge & 5G Cyber Security & Data Protection Merging Legacy Virtualization & Cloud Native Development Mission Critical Infrastructure Capturing Workloads & Building IT Solutions DateSession TopicRegister March 28, 2024 AI & Generative AI View Webinar View Presentation May 30, 2024 Edge & 5G Register Now July 25, 2024 Cyber Securit...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mit...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.