Ready, Set, Go!! - Procurement Readiness
Join us for our exciting 'Ready Set Go' presentation and get started on your path to mastering government procurement! Learn the secrets of professionalism and client respect and how to communicate your company's unique value. Learn about essentials such as how to register with SAM and SBA, and cybersecurity certification, and more.
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Understanding Federal Government Contra...
All Federal Government contractors have some sort of obligations to protect the Government information we are privileged to handle during the execution of the contract. Adam Austin, Co-Founder of Totem Technologies, will break down the types of cybersecurity requirements contractors may encounter, and describe where your organization can start to meet its obligations.
The Gartner Cookbook for Cloud Strategy
To succeed with cloud computing, a business-outcome-driven cloud strategy is essential. Enterprise architecture and technology innovation leaders face increasing challenges in prioritizing and ensuring their cloud strategy aligns with both immediate and long-term business goals. Organizations without a cloud strategy are less likely to achieve their desired business and technology outcomes. Join this complimentary Gartner cloud webinar as a Ga...
January 2, 2025
Organizer:
Gartner Location:
Webcast
3 Hour FERS Retirement Webinar by PlanW...
PlanWell Financial's 3 Hour Federal Retirement Webinar for FERS employees: Federal retirement workshops designed to cover every benefit in only 3 hours. We have cut out all the unrelated content that causes these retirement workshops to drone on for 8 hours or even 2 full days. If we haven’t answered your question, one of our Chartered Federal Employee Benefits Consultants (ChFEBC) will personally answer them for you at no cost. All atte...
ISC2 CISSP Training Boot Camp
Get ready for a six-day immersive training experience delivered online, in-person or in team onsite formats. Our expert instructors guide you through the eight domains of the ISC2 CISSP Common Body of Knowledge (CBK), covering all aspects of information security. We ensure you have the tools and resources to master this knowledge effectively. Here’s what you can expect:Training overview: Our industry-leading approach covers all aspects o...
January 5-10, 2025
Organizer:
Infosec Location:
Virtual
3 Steps to Predict Market Trends and Di...
Today’s rapidly evolving business landscape requires anticipating trends that could lead to market disruptions and opportunities. Executive leaders operate in complex environments, with an overwhelming amount of information. They inevitably miss out on the value of the multitude of signals (insights or intelligence) that are not attended to within their business ecosystem which vary in strength. However, the weak signals, if assessed tho...
January 6, 2025
Organizer:
Gartner Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.