Federal Executive Forum Chief Informati...
Cyber threats to government systems continue to grow more sophisticated, and agencies must work closely with each other and private sector partners to strengthen defenses and resilience. What security initiatives have been most effective, and what strategies are shaping the road ahead? During this webinar, you will gain the unique perspective of top federal and industry chief information security officers and cybersecurity leaders.
Strengthening Cybersecurity Through Inn...
As artificial intelligence, machine learning, and automation continue to evolve, organizations must rethink information sharing, response coordination, and risk mitigation to strengthen the cyber ecosystem and reshape cybersecurity resilience. Among the challenges: balancing innovation with security, privacy, and ethical considerations as agencies navigate the ever-evolving cyber landscape. Join us as thought leaders from government and indust...
September 22, 2025
Organizer:
FedInsider Location:
Webcast
THREATCON1
Join VulnCheck at the Carahsoft Conference and Collaboration Center for THREATCON1, where leaders in cyber threat response collaborate to get better, smarter and faster in how we protect our global economy and national security. Why attend THREATCON1?Hear a keynote session featuring Jen Easterly, former head of CISA, and Andrew Boyd, former head of offensive cybersecurity for the CIA.Network and enjoy an immersive experience with golf, innovat...
Cisco Certified CyberOps Associate Trai...
This comprehensive training boot camp equips you with the knowledge and skills necessary to enter the field of cybersecurity operations. By completing this course, you will:Become adept in security monitoring: Learn various techniques and tools to monitor security events and incidents and detect and respond to potential threats in real-time.Excel in network intrusion analysis: Learn to analyze network traffic, detect and investigate network-ba...
September 20-21, 2025
Organizer:
Infosec Location:
Dulles, VA
SANS Raleigh 2025
Serious Cyber Security Training in Raleigh Unlock the full potential of your cybersecurity career at SANS Raleigh 2025 (September 15-20, ET). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards...
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
September 15-19, 2025
Organizer:
Infosec Location:
Dulles, VA
Digital Shield Cyber & IT Summit at JBS...
"FORGING THE FUTURE: AI/ML, CYBERSECURITY, DATA, IT, NETWORKS, & THE ZERO TRUST FRONTIER" In an era of rapid technological evolution, the Digital Shield: Cyber & IT Summit brings together industry leaders, military experts, and cybersecurity professionals to explore cutting-edge advancements in AI, cybersecurity, data, IT, networking, and zero trust frameworks. This event will provide critical insights into the future of cyber defense,...
vCISO Services: The Next Big MSP Opportunity
According to the State of the Virtual CISO Report, MSPs and MSSPs offering vCISO services grew by 319% in just one year. This isn’t just a passing trend, it’s a major shift in how SMBs think about cybersecurity. Today’s clients want more than tools and ticketing. They’re looking for strategic guidance to reduce risk, expert advice on compliance. MSPs who are stepping up with vCISO services are seeing real results:Up to...
Shadow Steps: Understanding and Detecti...
This hands-on, scenario-driven workshop delves into how attackers move stealthily through Active Directory environments using user impersonation and lateral movement techniques. Participants will explore how attackers exploit credentials and trust relationships to expand their access, and how defenders can detect, prevent, and respond to such threats. Through simulated exercises and guided labs, participants will walk through real-world attack...
Hot Topics in Cybersecurity Day 3: The...
The federal mandate that agencies utilize a Zero Trust architecture to strengthen cybersecurity has been in place for four years, and most federal agencies have made excellent progress toward meeting the deadlines spelled out in the Executive Order. State and local governments are not covered by the federal EO, but many of them are pursuing their own zero trust policies or evaluating how to implement them. After all, having a zero trust archit...
September 18, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.