ISACA CISM Training Boot Camp
At Infosec’s CISM Boot Camp, you will explore and develop your essential skills and knowledge in the following domains: Domain 1: Information security governance (17%) Domain 2: Information security risk management (20%) Domain 3: Information security program (33%) Domain 4: Incident management (30%) By the end of the boot camp, you will have the knowledge, skills and confidence to excel in information security ma...
October 27-31, 2025
Organizer:
Infosec Location:
Virtual
ISC2 Certified Information Systems Secu...
During the six-day immersive CISSP training camp, our expert instructors will guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK). This covers all aspects of information security, from developing security policies to managing risk and understanding technical security controls.
October 26-31, 2025
Organizer:
Infosec Location:
Virtual
ISC2 CISSP Training Boot Camp
During the six-day immersive CISSP training camp, our expert instructors will guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK). This covers all aspects of information security, from developing security policies to managing risk and understanding technical security controls.
October 26-31, 2025
Organizer:
Infosec Location:
Virtual
2025 Government Cybersecurity Showcase...
California is setting the pace in cybersecurity, not only through cutting-edge solutions but also by driving collaboration across every corner of government. In 2025, cybersecurity is no longer the sole responsibility of technologists—it’s a shared mission that connects IT, data, AI, digital, operations, and service delivery teams alike. The Government Cybersecurity Showcase California, hosted by Public Sector Network, will highlig...
Building Your On-Prem Sovereign AI Foun...
Powering mission-critical AI requires a data strategy that doesn't compromise on sovereignty or security. Government agencies are challenged by high costs, rigid scalability and data silos of legacy infrastructure, requiring complete control over their data and models for sovereign AI. This mandates managing cybersecurity risks, skills shortages and balancing performance with regulatory compliance and the rapid AI ecosystem. Join MinIO and H2O...
Casepoint + OPEXUS Summit 2025
A day of insights, innovation, and partnership—built for those who serve the public good. Join us in DC for our annual event for government professionals working at the frontlines of FOIA, data discovery, audit, and investigations. This year’s event offers a fresh look at government innovation: expert thought leadership, peer-led panels, and actionable takeaways—all designed to help you lead with confidence in a complex regu...
Understanding TSP for Special Provision...
An Overview of TSP for Special Provision EmployeesHow TSP fits into a special provisions employee's overall retirementHow much to contributeTraditional vs. Roth TSPCan special provisions employees also contribute to an IRA?Investment optionsMilitary TSP AccountsAdvantages and Disadvantages of TSP loansTSP Withdrawals... and more!
Army Scholarship Foundation Fall Luncheon
Join us for an inspiring afternoon dedicated to honoring the families of our nation’s heroes and raising funds to provide college scholarships to the sons, daughters, and spouses of U.S. Army soldiers.
Maintaining Project Momentum in an Unst...
In this webinar hosted by Winmill PPM, you'll learn from Clarity by Broadcom experts about how it helps agencies overcome the current climate challenges by:Gaining clearer visibility into resources and prioritiesMaintaining continuity across programs even with leaner teamsStrengthening governance and reporting to meet compliance needsBuilding resilience to keep projects moving despite uncertainty
When Security Awareness Fails: Effectiv...
Based on Ponemon Institute research, cyber incidents reveal that recovery times are not hours, but days with organizations frequently suffering data loss. Despite the best efforts of cybersecurity awareness and security investments, organizations still need to amplify their recovery strategies to minimize business disruption and data integrity. This session will explore:How organizations should continue investing in cybersecurityWhy measure cy...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.