473 past events found
+ 6 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
CMMC 2.0: What's Changed and What's Next
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a group of third-party assessment organizations. The plan ran into a number of obstacles as industry organizations questioned...
July 28, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
GEOINT Service Day: Air Force and Space Force
USGIF kicks off a series focused on the GEOINT equities of the U.S. military forces with a day of programming dedicated to the U.S. Air Force and U.S. Space Force. This day of keynotes and panel discussions is sure to inform participants from around the force about how GEOINT matters to them. It also affords the opportunity for participants from USAF and USSF to share insights with GEOINT partners who are working to ensure the nation’s...
July 27, 2022
Organizer: USGIF
Location: Herndon, VA
Add Favorite
The Potential of AI for State and Local...
For states and localities looking to automate repetitious work, reduce paper-based tasks and streamline processes, artificial intelligence (AI) holds a lot of promise. The National Association of State CIOs (NASCIO) in their recent report on AI and machine learning drew upon a Deloitte assessment that categorized the benefits of automation into four groups: relieve, split up, replace, and augment. The challenge for state and local agencies is...
July 27, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. ​"Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" ​Sound familiar? Hundreds of Security, Compliance and Au...
July 25-27, 2022
Organizer: Corporate Compliance Seminars
Location: Dulles, VA
Add Favorite
Virtual Leadership Summit III
Mark your calendars for the next evolution in FEW’s training program, the Virtual Leadership Summit III (VLS III). FEW will host its third year of virtual training July 18 – 22, 2022, with no per diem or lodging cost required. Once again, FEW will explore the vast options available through an interactive platform to connect you with our trainers, sponsors, and colleagues. As the nation deals with the global pandemic, FEW will conti...
July 18-23, 2022
Organizer: Federally Employed Women (FEW)
Location: Virtual
Add Favorite
EC-Council Ethical Hacker Training - Ba...
The Certified Ethical Hacker certification is one of the most sought-after cybersecurity certifications around the globe. Organizations like the DoD and ANSI have endorsed and/or accredited the CEH course. Want to Master CEH? This program incorporates instruction and practice to get students ready to take the CEH certification exam as well as the CEH Practical Exam. Candidates who successfully pass both exams earn the CEH Master credential as...
July 18-22, 2022
Organizer: EC-Council
Location: Baltimore, MD
Add Favorite
Stronger Together: How to Empower Feder...
Cyberthreats and breaches can be detrimental to the safety of the American people. In a recent study by the Washington Post, IT and cybersecurity experts state that the Federal agencies are more vulnerable to threats and attacks than before. The last five years have seen an increase in the success of Federal agencies’ cybersecurity due to legislation and funding. However, the threats that we are now facing have advanced in the five years...
July 21, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
NIST Customer Verification Compliance f...
NIST Customer Verification Compliance for Financial Institutions Learn how to eliminate insecure knowledge-based authenticators across online mobile AND the call center! - NIST SP 800-63 Digital Identity Guidelines See examples of 2nd factor authentication that are compliant AND accessible 2nd factors that don’t require users to enter texted codes or install software with Okta Reduce cyber-insurance costs
July 20, 2022
Organizer: Okta
Location: Virtual
Add Favorite
Protecting Data from Ransomware
When the FBI released its 2021 Internet Crime Report, one statistic showed that ransomware attacks increased about 50% from 2020 levels, targeting everything from healthcare and education to law enforcement and municipalities. The rapid growth of ransomware attacks can damage your agency beyond its impact on downtime and the financial burden of recovery. Your agency’s reputation with its customers can be damaged. Taking steps in advance...
July 19, 2022
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
EC-Council SOC Analyst Training - Albuq...
The MasterClass SOC Analyst Program includes two courses and two certifications. We have combined the three-day Certified SOC Analyst (CSA) course with the two-day Certified Threat Intelligence (CTIA) course. Master how to Triage and classify incidents as well as how to coordinate Incident handling and response efforts. While our more technical programs like the Certified Ethical Hacker focus on the tactical Cyber Security elements you common...
July 11-15, 2022
Organizer: EC-Council
Location: Albuquerque, NM
Add Favorite
Back to Search Begin New Search