SANS Pen Test Austin 2024
Keep Hacking Weird in Austin for Hands-On Cyber Security Training SANS Pen Test Austin 2024 is the premier offensive security training event of the year, featuring six days of in-depth, hands-on pen testing, red teaming, purple teaming, and exploit training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks. Come for the hack...
NASCIO Midyear Networking Reception
We are delighted to have you join WWT for a networking reception during the 2024 NASCIO Midyear Conference! This networking reception will provide attendees an opportunity to: Network with WWT leadership and extended sales teams Meet with industry leaders from Cisco, Google Cloud and Intel Enjoy various refreshments and hors d'oeuvres Goals and Objectives Enjoy an evening of networking at Brass Tap with colleagues, and industry executives and...
ISACA CISA Training Boot Camp
Infosec’s CISA Boot Camp extensively prepares you for the ISACA CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors: Information systems auditing process Governance and management of IT Information systems acquisition, development and implementation I...
April 29 - May 3, 2024
Organizer:
Infosec Location:
Virtual
CompTIA CySA+ Training Boot Camp
The CompTIA CySA+ Training Boot Camp prepares you to pass the CySA+ certification exam by covering the following domains: Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools. Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices. Security operations and monitoring: Anal...
April 29 - May 3, 2024
Organizer:
Infosec Location:
Virtual
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer:
FedInsider Location:
Webcast
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer:
Trellix Location:
Webcast
Securing Today’s Always-On, Always-Conn...
A wave of connected devices and the coming of age for new technologies like AI has created a dramatically broader and constantly evolving threat landscape for manufacturing organizations. And the gap between securing IT and OT environments is only complicating matters. Join WWT Manufacturing and Distribution Practice Director Don Rogers and Senior Security Practice Manager Rob Toscano as they discuss practical steps security leaders in the man...
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer:
CMU - SEI Location:
Webcast
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
WIN GOVERNMENT CONTRACTS (podcast)
Win Government Contracts-Podcast Viewer Registration Link: (share with your community) - Note: this link changes every week https://streamyard.com/watch/HqDqa3qCidY2 Come learn how to win government contracts with us. Join GovAssociation and GovGenie each week in our live streaming coaching sessions where we address real world scenarios about strategies and techniques to win more government contracts. If you want to build wealth in the governm...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.