Denver Cybersecurity Conference
Don’t miss the Denver Cybersecurity Conference! Gain critical insights on tackling 2025’s cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your spot now to stay ahead of emerging challenges and strengthen your organization’s defenses. Admission is $150 (without a promo code) and includes a catered lunch, breakfast, snacks, a cocktail networking re...
Cybersecurity Monitoring Across Defense...
One of the biggest challenges in cybersecurity is how to monitor cybersecurity and risk across multiple systems, whether within a single federal agency or throughout a sprawling department. The U.S. Department of Defense has a program in place – Continuous Monitoring and Risk Scoring (CMRS) – to address the challenge. As the largest military force in the world, one with a global network of communications and IT systems, it is criti...
February 20, 2025
Organizer:
FedInsider Location:
Webcast
CTO Sessions: Best Practices for Implem...
Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems and Quantum Computing Cybersecurity Preparedness Act stress the need to update IT infrastructure today to combat the quantum threat. Both policies emphasize the use of cryp...
Southwest Regional CMMC Implementation...
2nd Annual Immersive Two-Day Conference February 19-20, 2025SMU CampusDallas, TexasThe Cybersecurity Maturity Model Certification (CMMC) is reshaping the landscape of defense contracting. Rigorous security standards are becoming mandatory for all suppliers. All supply chain providers will be assessed on these new rules before they can continue existing contracts or sign new ones. The Southwest Regional CMMC Implementation Conference (CIC) is a...
Beyond the Beltway 2025
Have you ever wondered what happens to your agency's old computers and smartphones? IT Asset Disposition (ITAD) – management of the entire lifecycle of IT assets, from procurement to disposal – is a crucial part of the cybersecurity process that often gets overlooked. Many agencies make the mistake of handling this process on their own, which can lead to serious data security risks. Proper ITAD requires specialized tools to ensure...
The Gartner 2025 Technology Adoption Ro...
Infrastructure and Operations (I&O) leaders are accelerating technology adoption to meet evolving customer demands. Of the 47 technologies assessed for Gartner’s Technology Adoption Roadmap for Infrastructure and Operations, 62% are currently in deployment, highlighting a significant shift in IT strategy. Join this complimentary Gartner I&O webinar as Gartner experts explore the implications of these deployed technologies and the...
February 19, 2025
Organizer:
Gartner Location:
Webcast
Zero Trust Summit
As federal agencies meet early deadlines for zero-trust adoption set in motion by the Biden administration’s executive order on cybersecurity and related mandates, it's becoming clear that achieving this basic level of zero-trust security isn't an end state — instead, it's the first step on a continued journey. And, as more and more transformation and innovation are introduced into the federal tech marketplace, agencies now have op...
February 19, 2025
Organizer:
CyberScoop Location:
Washington, DC
IntelliC0N 2025
Welcome to IntelliC0N! Join us for an exciting event filled with cyber innovators, threat intel experts, and CISOs. Get ready to dive into the world of cybersecurity and explore the latest on threat intelligence, and adversarial vs technology advancements.Join us for a unique opportunity to learn, network, and fortify your defenses with an intelligence-led approach. This event will be your chance to connect with the trailblazers of the industr...
February 18-19, 2025
Organizer:
Intelliguard Location:
Austin, TX
Certified CMMC Professional Training
The Cybersecurity Maturity Model Certification & Certified CMMC Professional Course The credentials of the CMMC Certified Professional (CCP) are in high demand and the requirements and evidence are highly complex and detailed. This course walks participants through the basic principles for performing an assessment, completing the documentation required for the assessment, and understanding the foundation of the CMMC Model. In addition to t...
ChannelPro Deep Dive: Top Threats to Yo...
As we move into 2025, businesses face an evolving landscape of risks that can impact their operations, data security, and reputation. In this webinar, “Top Threats to Your Clients in 2025 and How to Profit from Protecting Them,” we’ll explore the emerging threats that are likely to dominate the business environment—from cybersecurity vulnerabilities and regulatory challenges to supply chain disruptions and economic unce...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.