June Cybersecurity Division Meeting
Cyber compliance for federal contractors grows in scope and scale on an almost-daily basis and keeping up with the changes can be challenging and overwhelming. Join the NDIA Cybersecurity Division to hear about the latest on the Cybersecurity Maturity Model Certification (CMMC), civil cyber fraud, supply chain security, software assurance and other policy and legal developments. Join colleagues, counterparts and the Division Committees focused...
ICS/SCADA Cybersecurity Symposium
Organizations in manufacturing, transportation, energy, water treatment, healthcare and other critical sectors face the increasingly present threat of cyber attacks to their industrial control systems (ICS). Advanced persistent threat (APT) groups have the resources and support to mount attacks that are complex, orchestrated, and ever-more sophisticated. Operators of critical infrastructure face the critical task of continually safeguarding ke...
June 3-4, 2025
Organizer:
Infosec Location:
Chicago, IL
ZenithLive 2025
Zenith Live is our flagship annual security event. This year, Zenith Live '25 brings you a full agenda packed with the latest innovations, best practices, customer stories, and thought leadership around zero trust, cloud security, digital transformation, securing AI, and more. Zenith Live sets the stage for engaging, thought-provoking sessions you won't find at any other cybersecurity event:Explore our newest technologies and insights with Zsc...
June 2-4, 2025
Organizer:
Zscaler Location:
Las Vegas, NV
IT Nation Secure 2025
Join the MSP cybersecurity community for three action-packed days of expert-led sessions, hands-on labs, and networking with like-minded peers! As the premier cybersecurity conference for managed service providers (MSPs), IT Nation Secure™ is designed to empower you to become the go-to cybersecurity expert for your clients. You'll walk away with insights into the latest technologies, tools, and best practices to enhance your cybersecurit...
June 2-4, 2025
Organizer:
ConnectWise Location:
Kissimmee, FL
Identity Gaps are the New Insider Threat
When legitimate credentials are used for illegitimate purposes, traditional defenses fall short. That’s the reality government agencies are facing—across state, local, tribal, and territorial levels. The challenge isn’t just keeping bad actors out anymore; it’s spotting them when they’re already in, using real accounts to move laterally, elevate privileges, and quietly dig deeper. This is where SailPoint solutions...
June 3, 2025
Organizer:
FedInsider Location:
Webcast
The Evolving Role of the CISO: New Mind...
Chief information security officers in state and local government play a vital role when it comes to supporting innovation and modernization. Instead of saying no to new ideas, forward-looking CISOs help leaders and teams understand and manage risk with a new mindset that emphasizes collaboration and efficiency. This drives the need for new technology tools that provide comprehensive visibility into IT assets and processes, identify and quanti...
Outcome - Oriented Approaches to Succes...
The Department of Defense and Congress have undertaken a number of initiatives to improve the ability to acquire complex software technologies and services for advanced defense capabilities, but these have been limited in their success in improving program outcomes. Most recently, the Secretary of Defense issued a memo entitled "Directing Modern Software Acquisition to Maximize Lethality" that seeks to “deliver software faster and tap in...
NICE Conference & Expo: Strengthening E...
The NICE Conference is the annual convening of community members and thought leaders from education, government, industry, and non-profits to explore ways of developing a skilled cybersecurity workforce ready to meet the challenges of the future. This event provides an opportunity to share best practices from around the world and across sectors in order to build the workforce we need to confront cybersecurity risks today and in years to come....
SANS Ransomware Summit 2025
Ransomware attacks are widespread because they are highly profitable and effective for cybercriminals. Many organizations are unprepared for such attacks, leading to serious financial and operational damage. The SANS Ransomware Summit brings together cybersecurity professionals to share insights on preventing, detecting, and recovering from ransomware. The Ransomware Summit will explore these topics:Ransomware intrusion emulationRansomware ini...
Safeguarding Students, Responders and R...
Imagine trying to stop thousands of cyber threats every single day. That's the reality IT teams worldwide are facing when it comes to cyberattacks. Discover how to enhance your own organization's security posture by hearing firsthand from Texas A&M University's experience in unifying their security operations. Join Elastic to explore how Texas A&M University achieved security efficiency and reduced incident resolution times by 99% and...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.