The Role of Detection in Insider Risk S...
Recent public comments by the directors of the FBI, CIA, and DCSA around the troubling call to action for those whose crisis of conscience, moral outrage put them on a path to radicalization and potential engagement in destructive actions. Globally and locally within our own cities there is a growing disgruntlement and perceived marginalization of individuals. These individuals, who make up our workforce and supply chain, are being targeted by...
July 30, 2024
Organizer:
ATARC Location:
Webcast
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Reducing Risks: Leveraging Software Tes...
As the world moves towards an increasingly digital future, it’s evident that the evolution of government services must follow suit. It is time for agencies to embark on the journey of modernization, ensuring that their vital services are accessible to all constituents, both online and offline. By leveraging resources effectively, software delivery teams can accelerate deployment timelines, enhance accuracy, and mitigate risks. Discover h...
What to Do & Not to Do When DCAA Cites...
OverviewThis FREE webinar will offer attendees an overview of how to deal with DCAA audit findings and what to do and NOT to do in response to DCAA findings. Redstone GGI has subject matter experts who can assist you with resolving DCAA audit findings. Learning ObjectivesAt the completion of this one-hour webinar, participants will be able to identify:What are red flags for potential audit findings?What is a DCAA audit finding?What are the two...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Assessing Controls in Performance Audits
Internal control is an important focus for auditors as they commonly identify weaknesses in internal controls as an underlying cause of organizations struggling to deliver effective and efficient results. Through lecture, group discussions, and case studies, this course provides auditors with a comprehensive understanding of the five components of internal control and the 17 underlying principles. The course will explain the audit planning and...
July 10-11, 2024
Organizer:
Parker CPE Location:
Webcast
Quantum Speaker Series PQC Roadmap
Christian Lowry is the Emerging Risks Branch Chief in the National Risk Management Center, part of the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Christian leads a team of analysts assessing risks to critical infrastructure from emerging technologies, including artificial intelligence and quantum computing. Christian has also led NRMC’s analysis efforts related to the Information...
July 9, 2024
Organizer:
ATARC Location:
Webcast
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.