Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
Protecting APIs & Sensitive Data
In today’s interconnected digital landscape, application programming interfaces (APIs) play a pivotal role in facilitating seamless communication and data exchange between various applications and systems. However, with this increased connectivity comes heightened security risks, particularly concerning the protection of sensitive data in those APIs. One of the most notorious examples of API risk is the Cambridge Analytica scandal in the...
August 29, 2024
Organizer:
FedInsider Location:
Webcast
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and eva...
EEOC EXCEL Training Conference
The 27th annual EEOC EXCEL Training Conference is the premier EEO training conference for EEO, HR, and legal professionals from private, state, and local government, and Federal organizations. EXCEL features:Over 70 Workshops3 Plenary Sessions8-hour Counselor Refresher8-hour Investigator RefresherEquitable Leadership: Empowering Fairness and Respect in the WorkplaceThe Equitable Workplace: Employee Strategies for Creating Respectful WorkplaceE...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively. Created in response to fee...
Government Strategies & Investment for AI
As all levels of government seek ways to harness the benefits of artificial intelligence ( AI ) and mitigate its potential risks, the need for an overall national strategy to foster innovation, competitiveness, and economic growth becomes clearer. At the federal level, the Office of Management and Budget (OMB) issued a memo in March providing guidance for agencies to establish AI governance and risk management techniques while implementing inn...
August 1, 2024
Organizer:
FedInsider Location:
Webcast
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
The Role of Detection in Insider Risk S...
Recent public comments by the directors of the FBI, CIA, and DCSA around the troubling call to action for those whose crisis of conscience, moral outrage put them on a path to radicalization and potential engagement in destructive actions. Globally and locally within our own cities there is a growing disgruntlement and perceived marginalization of individuals. These individuals, who make up our workforce and supply chain, are being targeted by...
July 30, 2024
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.