Tabletop Exercise: Is China and Russia...
Do you know what is inside your software? As software supply chains become increasingly intricate, the threat of foreign adversaries infiltrating critical systems through compromised code has escalated dramatically. With open-source components forming the backbone of modern applications, often with dependency chains 60 levels deep, cybersecurity leaders face a daunting challenge: 6.8% of open-source software is of dubious origin, and over 20%...
Building Resilient Digital Government ...
As we look ahead to 2026, state and local governments and education institutions face a pivotal moment. Emerging technologies like AI, increasing cyber threats and rising expectations for service delivery are forcing organizations to rethink how work gets done. Join us for a future-focused conversation that sets the stage for what's next. This live webinar will unpack the key trends reshaping the public sector workforce and highlight practical...
The AI Threat: Protecting Education fro...
Across K–12 and higher ed, cybercriminals are leveraging generative AI to launch more targeted, scalable, and convincing attacks than ever before, and email remains a primary point of vulnerability. AI-crafted phishing campaigns, business email compromise (BEC), and other advanced social engineering tactics can disrupt learning, compromise sensitive data, and erode trust. Join the Center for Digital Education and Abnormal AI for a webina...
CompTIA Cybersecurity Analyst (CySA+) C...
The CompTIA CySA+ Training Boot Camp prepares you to pass the CompTIA Cybersecurity Analyst (CySA+) certification exam by covering the following domains:Threat and vulnerability managementSoftware and systems securitySecurity operations and monitoringIncident responseCompliance and assessmentBy the end of the CySA+ boot camp, you are prepared for the CySA+ certification exam and equipped with the behavioral analytics skills needed to increase...
January 26-30, 2026
Organizer:
Infosec Location:
Virtual
EC-Council Certified Ethical Hacking Co...
In this updated version of the Certified Ethical Hacker boot camp, AI is integrated into all five phases of ethical hacking methodologies from reconnaissance and scanning to gaining access, maintaining access, and covering tracks. CEH v13 equips students to battle AI with AI, providing the ultimate training ground for mastering AI-driven cybersecurity skills. Team managers see a 40% increase in cyber defense efficiency from their employees aft...
January 26-30, 2026
Organizer:
Infosec Location:
Virtual
CompTIA Security+ Certification Trainin...
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
January 26-30, 2026
Organizer:
Infosec Location:
Virtual
Government Innovation California
California continues to lead the nation in digital government, investing heavily in modern infrastructure, data programs, and cyber resilience. Yet agencies still face persistent challenges—from legacy systems and siloed decision-making to workforce skill gaps, fragmented data governance, and increasing pressures around cybersecurity, AI governance, and public trust. Addressing these complex issues requires shared learning, practical ups...
Working with CISA
Join Dcode on Thursday, January 29 from 2–3pm ET for a session with Nick Andersen, Executive Assistant Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), focused on how early- and growth-stage technology companies can understand, navigate, and engage with CISA’s mission to secure US critical infrastructure. As the federal government sharpens its focus on cybersecurity resilience, speed, and a...
January 29, 2026
Organizer:
Dcode Location:
Webcast
Preparing For the Inevitable: Using Arm...
Traditional cybersecurity has long focused on building higher walls to keep threat actors out. Cyber resilience takes a more realistic approach, assuming breaches will occur and prioritizing the ability for the business to continue operating during and after an attack. Join us to explore how Armis helps organizations move from reactive security to proactive cyber resilience by delivering the foundational intelligence needed to understand, mana...
Using AI for the Heavy Lifting in CMMC...
As of Nov. 10, 2025, Cybersecurity Maturity Model Certification (CMMC) compliance is no longer optional for the Defense Industrial Base (DIB). With the three-year phase-in period already underway, federal systems integrators (FSIs) face growing pressure to implement CMMC Level 2 across multiple customer environments without increasing delivery risk or compliance overhead. Success requires structuring CMMC compliance correctly, which means focu...
January 29, 2026
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.