Back to Search Begin New Search Save Search Auto-Notify
Showing results for cybersecurity
Search instead for cyber security
The Gartner Top Trends in Cybersecurity...
In an era of relentless technological and business disruption, the limits of security programs and team performance are constantly tested. Cybersecurity leaders face the dual challenge of not only protecting their organizations but also enabling business value. To prove the effectiveness of security programs in 2025, leaders must focus on embedding resilience at the organizational, personal and team levels. Join this complimentary Gartner webi...
July 1, 2025
Organizer: Gartner
Location: Webcast
Add Favorite
The New Print Frontier: Securing Endpoi...
Printers are no longer just peripherals — they’re endpoints. And for many organizations, they’re a vulnerable one. Join HP’s Steve Inch, for a live discussion that reveals how the evolving cybersecurity landscape — especially the rise of quantum computing — demands a new level of vigilance when it comes to securing your print infrastructure. We’ll dive into:Practical steps you can take immediately to i...
June 30, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
June 23-27, 2025
Organizer: Infosec
Location: Virtual
Add Favorite
CompTIA Cybersecurity Analyst (CySA+) C...
The CompTIA CySA+ Training Boot Camp prepares you to pass the CompTIA Cybersecurity Analyst (CySA+) certification exam by covering the following domains:Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools.Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices.Security op...
June 23-27, 2025
Organizer: Infosec
Location: Virtual
Add Favorite
Tampa Cybersecurity Conference
Join Us in Tampa for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community. Don’t miss our special ceremony recognizing our...
June 26, 2025
Organizer: FutureCon
Location: Tampa, FL
Add Favorite
Why a Consistent Website Experience Sig...
Constituents rely on government websites to access services, submit sensitive information, and get accurate answers. That trust can break down quickly when digital experiences feel outdated, disjointed, or unfamiliar. A consistent visual and content strategy across agencies does more than create a clean user experience—it establishes legitimacy, reinforces security, and helps residents recognize official government communications. It als...
June 26, 2025
Organizer: Government Technology
Location: Webcast
Add Favorite
Live AWS Workshop: Build and Deploy You...
Ready to discover the power of cloud computing? Don't miss this hands-on training where you'll build real AWS infrastructure and deploy a live site — all in less than an hour. This isn't a passive course. You will actively participate every step of the way and leave with some of the same practical skills students learn in our 3-day AWS boot camps. Already familiar with cloud basics? Come see how AWS makes complex tasks surprisingly simpl...
June 26, 2025
Organizer: Infosec
Location: Webcast
Add Favorite
Talking Tech: Simplifying STIG Complian...
The U.S. Department of Defense uses security standards that are set forth in its Security Technical Implementation Guide (STIG) to help protect its systems and networks. By implementing unified automation, which integrates automated tools with the STIG standards, DoD can improve system-level control compliance throughout the software lifecycle. From reduced timelines and improved reliability to sustainable ATO processes, unified STIG automatio...
June 26, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Supply Chain Cybersecurity Forum
Beyond the Perimeter: Securing What You Don’t Control As software and hardware supply chains grow more complex and globally interconnected, they have also become prime targets for attackers. From deeply embedded vulnerabilities in third-party components to subtle software compromises and counterfeit hardware, today’s supply chain threats are stealthy, sophisticated, and increasingly difficult to detect. Join us for a focused 3-hour...
June 26, 2025
Organizer: SANS Institute
Location: Webcast
Add Favorite
The State of Government Contracting in...
In a year of uncertainty and change, it’s more important than ever for government contractors to be aware of current market trends — and the Deltek Clarity Government Contracting Industry Report is the resource you need to stay ahead of the curve! Now celebrating its 16th year, Deltek’s Clarity report offers unique insights on market trends, spending outlook and industry benchmark data based on responses from nearly 900 gover...
June 26, 2025
Organizer: Executive Mosaic LLC
Location: Virtual
Add Favorite
Back to Search Begin New Search