Back to Search Begin New Search Save Search Auto-Notify
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
September 23-27, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
September 26-27, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
The Future of 5G Technology in Government
The advent of 5G technology opened a new world of possibilities, enabling applications such as autonomous vehicles, the Internet of Things IoT), and smart cities. The next-generation communications standard already in development – 6G – is a revolutionary technology that will provide unprecedented speeds and low latency, making it perfect for innovative use cases such as smart homes, autonomous transportation systems, healthcare, a...
September 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
September 30, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mit...
September 30, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Transforming Public Sector Leadership w...
In today’s rapidly evolving public sector landscape, the ability to make informed, data-driven decisions is more critical than ever. For instance, using data gathered on water quality can be used for planning and designing environmental interventions to keep pollutants out of groundwater. Many agencies may implement data-driven decisions to improve citizen services, cutting down on response times and improving the quality of those servic...
September 30, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
AI Promises to Unlock Research Potentia...
The federal government is doing everything it can to encourage agencies to adopt artificial intelligence tools to improve all aspects of their performance, while simultaneously paying close attention to potential risks of this exciting new technology. Currently, few agencies have adequate access to supercomputers and the deep expertise needed to operate the technology and test potential applications on secure infrastructure. This is beginning...
October 2, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust Architecture (NIST SP 800-207)
In this CPE training event, we overview the principles and implementation of Zero Trust Architecture to enhance your organization's security posture. Zero Trust Architecture, based on the NIST SP 800-207 criteria, revolutionizes the traditional approach to cybersecurity. It challenges the assumption of implicit trust within networks and promotes a model where trust is never granted by default. Instead, it emphasizes continuous analysis and ev...
October 7, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
5G as a Digital Transformation Accelerant
The United States leads the world in adopting 5G technology for communications and wireless internet access, thanks to its high speed, low latency, and increased bandwidth access. This has provided a huge boost to digital transformation in both the public and private sectors. For instance, the rapid adoption of edge computing can be attributed to 5G’s superior qualities. The spread of 5G was accelerated by the pandemic, as agencies and b...
October 7, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Adding System Observability to Monitori...
Government agencies at all levels are under pressure to modernize their IT infrastructure to meet the evolving needs and expectations of their customers, stakeholders, and employees. The ubiquity of smart phones and tailored apps in the broader world have raised user expectations for government systems to work the same way. Modernization certainly presents a host of opportunities to improve agencies’ performance, but it comes with its ow...
October 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search