January Cyber Meetup: Cyber, Lies, ...
Join us on Tuesday, January 7, 2025, for the first Loudoun Cyber Meetup of 2025 at Old Ox Brewery, in Ashburn! We are excited to announce that this event features a fireside chat with Andrew McCabe, CNN Law Enforcement Analyst and Former Deputy Director of the FBI, and Gregory Crabb, CISO in Residence at Ballistic Ventures and Founder of 10-8, LLC! This fireside chat promises to be an eye-opening discussion on the evolving cyber landscape amid...
January 7, 2025
Organizer:
ATARC Location:
Ashburn, VA
How CIOs Can Protect the Organization F...
CIOs need to act as an executive first and a functional business leader second. One functional area of continued importance with a multitude of challenges is cybersecurity. Increasingly advanced threats continue to emerge from a wider set of global factors. News can rapidly snowball and put an organization, CIO and CISO reputations at risk. Plus, it remains challenging to find and retain critical cybersecurity talent. Furthermore, 44% of C-sui...
January 7, 2025
Organizer:
Gartner Location:
Webcast
CompTIA PenTest+ is Changing in 2025: E...
Penetration testers find and report vulnerabilities before they can be exploited, and CompTIA’s PenTest+ is one of the best certifications to validate those skills. PenTest+ is getting an overhaul in 2025 to align with the most up-to-date hacking and pentesting skills, tools and techniques requested by employers. Join Patrick Lane, Director of Cybersecurity Product Management at CompTIA, on January 7 at 11 a.m. Central. to get the inside...
January 7, 2025
Organizer:
Infosec Location:
Webcast
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ready, Set, Go!! - Procurement Readiness
Join us for our exciting 'Ready Set Go' presentation and get started on your path to mastering government procurement! Learn the secrets of professionalism and client respect and how to communicate your company's unique value. Learn about essentials such as how to register with SAM and SBA, and cybersecurity certification, and more.
Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive p...
Protect the Mission: Secure Supply Chain
In an era of increasing cybersecurity threats, federal healthcare agencies can't afford to leave their software supply chains vulnerable. Join us for a dynamic webinar that reveals how Red Hat OpenShift, Ansible, and Red Hat’s Secure Software Factory can help you stay ahead of threats and meet stringent compliance requirements, including NIST and FedRAMP. Learn how to adopt automation and a zero-trust architecture to mitigate risks, resp...
December 20, 2024
Organizer:
Red Hat Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.