Infosec CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
April 1-5, 2024
Organizer:
Infosec Location:
Virtual
Fortifying Election Cybersecurity
As the next round of national and local elections draws closer, election officials are concerned about facing potential cybersecurity threats targeting election networks and systems they support. Blocking these threats can be a daunting challenge for government officials working with limited funds and talent, so they’ll want to implement proactive strategies to harden infrastructure, and implement a holistic approach with world-class inf...
Securing Copilot for Microsoft 365 Education
Join the K12 Security Information eXchange (K12 SIX) and Microsoft for an informational webinar focused on how to increase the security of Copilot for Microsoft 365. With new advancements in AI happening faster than ever before, you might be wondering how you can securely use these tools in your classroom to save educators time and energy. Learn how to secure Copilot for Microsoft 365, an AI companion that helps users save time, differentiate...
April 2, 2024
Organizer:
K12 Six Location:
Webcast
Information Security Forum 2024
The 25th Annual Information Security Forum will be held on April 2-3, 2024 at the Palmer Events Center in Austin, Texas and is hosted by the Texas Department of Information Resources (DIR) Office of the Chief Information Security Officer (OCISO). The Information Security Forum is an educational conference bringing together security and IT professionals from public sector organizations across the state of Texas. This premier conference focuses...
DoD Zero Trust Symposium
The second annual virtual symposium will reflect the progress with ZT implementation. Hear from more than 20 different speakers representing government, industry, and academia who will share their perspectives and experiences. Learn about ZT implementation successes and other lessons learned that can help you whether you are just beginning with ZT or you are well along the path of ZT implementation.
Nevada Public Sector Cybersecurity Summ...
Cyber-attacks have increased dramatically over the last few years. The 2024 Nevada Public Sector Cybersecurity Summit provides an opportunity for government technology professionals to learn about the latest efforts to defend, respond and recover from cyber criminals who wish to do harm. The Summit will include cybersecurity leaders from state and local government throughout Nevada. Open to Public Sector only.
Protecting APIs & Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
April 3, 2024
Organizer:
FedInsider Location:
Webcast
Spring Symposium: How AI is Transformin...
This event is at capacity Join 250+ intelligence and national security professionals at INSA's 2024 Spring Symposium: How Artificial Intelligence is Transforming the IC, on Thursday, April 4, from 8:00 am - 5:00 pm at the INSA/NRECA Conference Center in Arlington, VA. Focused on current and future technology developments, this full day program features two keynote addresses and four panel discussions!
Election Staffing Governance: Securing...
Provisioning identity security for seasonal election workers presents a myriad of challenges for government election boards and commissions. Managing identities across disparate systems and platforms becomes particularly complex due to the temporary nature of election work. Seasonal election workers, including poll clerks and ballot counters, require access to various electoral databases, polling stations, and voting equipment. Coordinating th...
Operationalizing Zero Trust: Securing C...
In the rapidly evolving landscape of cybersecurity, the Zero Trust model has emerged as a cornerstone principle, dictating that trust must never be implicit and must be continually earned. This webinar, “Operationalizing Zero Trust: Securing Containers in Runtime,” delves into the practical applications of Zero Trust architecture within live container workloads, an area fraught with potential vulnerabilities and attack vectors. Joi...
April 4, 2024
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.