Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mit...
ATARC's Federal Zero Trust Summit
Amidst the ever-shifting digital terrain, federal agencies confront a multitude of cyber challenges, necessitating a proactive stance towards resilience. As cyber threats evolve, agencies must continuously adapt their defenses, remaining vigilant against emerging risks and vulnerabilities. Compliance and regulatory frameworks further complicate the landscape, demanding constant policy refinement to uphold standards and safeguard sensitive info...
October 3, 2024
Organizer:
ATARC Location:
Reston, VA
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
2024 Fall Joint AIA/NDIA Industrial Sec...
This biannual conference, presented in partnership with the National Defense Industrial Association (NDIA), serves as the forum for executive-level security leadership and policy-makers across the federal agencies and U.S. Industry to convene to address major government security topics. Don’t miss this opportunity for candid discussion, high-level networking, and updates on important subjects. Themes and challenges addressed include:Cont...
Tools for Designing and Assessing Spillways
Join us on October 8, from 12:00 PM - 2:00 PM Eastern for Tools for Designing and Assessing Spillways. Spillways are complex hydraulic structures with materials and geometries that are often tailored to unique site conditions. As such, the analysis associated with the design and assessment of spillways needs to be commensurate with the complexity of the structure and the risk posed by the structure. Some of the complex hydraulic issues often c...
Quantum Speaker Series Presents: Scalin...
Once fully realized, quantum computers will solve problems we never thought possible. Building a quantum computer with enough power to solve these problems is one of this decade’s biggest technological challenges. Xanadu is taking on this challenge in its mission to build quantum computers that are useful and available to people everywhere. Xanadu Founder and CEO Christian Weedbrook talks about his quantum computing journey and outlines...
October 8, 2024
Organizer:
ATARC Location:
Webcast
October 2024 Procurement Division Meeting
Join the NDIA Procurement Division on October 8th for their quarterly meeting which will feature speakers and panelists addressing current defense industrial base issues and today's challenges facing the acquisition and procurement community. These meetings also provide an opportunity for the divisions' committees to conduct business specific to its members. Committees include: Contract and Acquisition Management and Legal Committee and Contra...
Insider Risk Programs: Three Truths and a Lie
In this webinar, Everfox Director of Enterprise User and Data Protection, Michael Crouse, shares insights on why insider risk management is not about cyber controls and checklists that only show what occurred without indicating why. Insider risk sits at the junction of organizational and technical controls where an insider risk management plan must address the needs of the program before, during and after critical events, not just during incid...
Configuration and Data Management Certi...
Join the NDIA Technical Information Division at the next Configuration and Data Management (CDM) Course & Exam to develop a strong professionalism in these disciplines that are critically important in the design, development, production, test, integration, and maintenance of complex products. With such importance, these disciplines have many global applications in both commercial and government realms because most organizations recognize C...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.