ISC2 CISSP Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect: Training overview: Our industry-leading approach covers all aspects...
September 8-13, 2024
Organizer:
Infosec Location:
Orlando, FL
A Practical Guide to Third-Party Transf...
Join us for an informative webinar on navigating third-party transfers and retransfers in compliance with the International Traffic in Arms Regulations (ITAR). This session will provide participants with practical guidance and expert insights to effectively manage third-party transfers and retransfers while ensuring compliance with ITAR requirements. In this special one-hour event, we will examine the third-party transfer (TPT) requirement in...
Shutting Down Session Hijacking and Cre...
According to IBM's 2024 X-Force Threat Intelligence Index, valid credential abuse was the top initial access vector in 2023. And with the growing threat of credential theft and session hijacking, cybercriminals are constantly finding new and exciting ways to infiltrate organizations of all sizes. Come join us for a webinar where we’re introducing Huntress MDR for Microsoft 365’s new Unwanted Access capability. It’s built to s...
September 12, 2024
Organizer:
Huntress Location:
Webcast
Arizona Technology Summit
The 15th Annual Arizona Technology Summit will be held on September 12th, 2024 at the Phoenix Convention Center (100 N 3rd Street, Phoenix, AZ 85004) from 7am-4pm. This B2B conference is targeted for the Technology and Security community. Attendees consist of IT/IS Executives and Direct reports across all verticals within the state of Arizona interested in Networking, Researching/Learning, Career Advancement, and Purchasing. Attend the Arizona...
September 12, 2024
Organizer:
Machaon Corp. Location:
Phoenix, AZ
How to Follow DoD Zero Trust Guidelines
Zero Trust .... But VerifyZero trust security is a necessity in modern cybersecurity frameworks, endorsed by comprehensive directives from the United States Department of Defense (DoD) and the Cybersecurity and Infrastructure Security Agency (CISA). The DoD Zero Trust Strategy alongside the DoD Zero Trust Capability Execution Roadmap offers in-depth guidance designed to facilitate any organization's transition to a robust Zero Trust model. Joi...
DC/Reston Cybersecurity Conference
Embark on a transformative odyssey at the DC/Baltimore Cybersecurity Summit, where you'll plunge into cutting-edge insights to adroitly navigate the dynamic terrain of cyber threats in 2024. Engage with industry luminaries and influential leaders, while forging direct connections with representatives from top-tier global providers of cybersecurity solutions. Embrace the DC/Baltimore Cybersecurity Summit as your pivotal juncture to connect with...
GOVJAM 2024
Join us for the highly anticipated 4th Annual GOVJAM on September 12, 2024, for a night of lights, motion, and sound, where professionals from the GovCon community can come together and have a blast! Experience the Rhythm: Get ready to groove to the beats of incredible bands associated with the public sector in the DMV area. These talented musicians will have you dancing, moving, and jumping to a plethora of songs you won't be able to resist!...
September 12, 2024
Organizer:
GovLink Location:
McLean, VA
Executive Order 14028: Improving the Na...
Microsoft is committed to building products to help government agencies and critical infrastructure companies improve national cybersecurity. This webinar will cover how Microsoft Entra ID helps organizations meet the identity requirements of the Executive Order. Join us to learn about practical implementations and how Microsoft Entra ID integrates with your existing systems to enhance compliance and security. Learning Objectives:Understand th...
How To Assess Your Starting Point And C...
How To Assess Your Starting Point And Creating A Strategic Capture PlanIn Government Contracting Official Enrollment: www.CaptureManagement.org Come join us weekly as we train and prepare you to capture government contracts. These sessions are designed to prepare those enrolled in the Certified Capture Manager (CCM) Program to pass the CCM Exam and become certified professionals. Also, these classes are open to all GCA members, partner members...
AWS Non-Profit Healthcare - Zero Trust...
Join us for the latest insights on securing your healthcare organization with a Zero Trust Framework. Mark your calendars and join us for our Zero Trust Roadshow. Attendees of this event can expect to learn more about specific Zero Trust strategies and solutions such as: Data Security strategies to encrypt data at rest and in transit. Endpoint protection measures to safeguard devices from malware, vulnerabilities, and unauthorized access. Iden...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.