Back to Search Begin New Search Save Search Auto-Notify
SANS Pen Test Austin 2024
Keep Hacking Weird in Austin for Hands-On Cyber Security Training SANS Pen Test Austin 2024 is the premier offensive security training event of the year, featuring six days of in-depth, hands-on pen testing, red teaming, purple teaming, and exploit training for professionals who need to know how to find vulnerabilities within their organizations, understand risk, and prioritize resources based on potential real-world attacks. Come for the hack...
April 22-27, 2024
Organizer: SANS Institute
Location: Austin, TX
Add Favorite
NASCIO Midyear Networking Reception
We are delighted to have you join WWT for a networking reception during the 2024 NASCIO Midyear Conference! This networking reception will provide attendees an opportunity to: Network with WWT leadership and extended sales teams Meet with industry leaders from Cisco, Google Cloud and Intel Enjoy various refreshments and hors d'oeuvres Goals and Objectives Enjoy an evening of networking at Brass Tap with colleagues, and industry executives and...
April 29, 2024
Organizer: World Wide Technology
Location: Oxon Hill, MD
Add Favorite
ISACA CISA Training Boot Camp
Infosec’s CISA Boot Camp extensively prepares you for the ISACA CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors: Information systems auditing process Governance and management of IT Information systems acquisition, development and implementation I...
April 29 - May 3, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
CompTIA CySA+ Training Boot Camp
The CompTIA CySA+ Training Boot Camp prepares you to pass the CySA+ certification exam by covering the following domains: Threat and vulnerability management: Perform vulnerability management activities and analyze output from vulnerability assessment tools. Software and systems security: Apply security solutions for infrastructure management and implement software and hardware assurance best practices. Security operations and monitoring: Anal...
April 29 - May 3, 2024
Organizer: Infosec
Location: Virtual
Add Favorite
Building Responsible AI Workflows with...
Generative artificial intelligence (genAI) has arrived with the force of a tsunami across the federal government. In October, Executive Order 14110 on the safe, secure, and trustworthy development and use of AI established the broad outlines for how agencies should evaluate and implement their AI use cases. Now the Office of Management and Budget has issued a memorandum directing agencies to institute governance and risk management processes g...
April 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Unveiling the Cyber Pandora's Box
Today's digital battlegrounds witness a critical convergence of cybersecurity assaults driven by artificial intelligence alongside formidable adversaries. Join us for an engaging discussion led by industry experts, as they impart invaluable insights into harnessing threat intelligence to proactively combat the evolving cyber threats propelled by AI technology. Our esteemed panelists will delve into strategies to bolster your organization's def...
April 30, 2024
Organizer: Trellix
Location: Webcast
Add Favorite
Securing Today’s Always-On, Always-Conn...
A wave of connected devices and the coming of age for new technologies like AI has created a dramatically broader and constantly evolving threat landscape for manufacturing organizations. And the gap between securing IT and OT environments is only complicating matters. Join WWT Manufacturing and Distribution Practice Director Don Rogers and Senior Security Practice Manager Rob Toscano as they discuss practical steps security leaders in the man...
April 30, 2024
Organizer: World Wide Technology
Location: Virtual
Add Favorite
Using a Scenario to Reason About Implem...
There is a lot of documentation about a zero trust architecture, as well as directives that it be used for U.S. federal agencies and the Department of Defense (DoD), but little information on how to go about implementing it to improve an organization’s enterprise or DoD weapon system security. Use cases typically describe requirements for these systems, but they do not provide the contextual awareness that organizations need to help them...
April 30, 2024
Organizer: CMU - SEI
Location: Webcast
Add Favorite
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer: Fedinsider
Location: Webcast
Add Favorite
WIN GOVERNMENT CONTRACTS (podcast)
Win Government Contracts-Podcast Viewer Registration Link: (share with your community) - Note: this link changes every week https://streamyard.com/watch/HqDqa3qCidY2 Come learn how to win government contracts with us. Join GovAssociation and GovGenie each week in our live streaming coaching sessions where we address real world scenarios about strategies and techniques to win more government contracts. If you want to build wealth in the governm...
May 1, 2024
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search