AI Solutions to Close the Risk-Confiden...
While AI is a powerful tool for businesses, it's important to remember: not all AI solutions are created equal. Organizations must carefully evaluate AI options to ensure they align with specific needs and organizational or mission objectives. In this conversational webinar our panel of subject matter experts will discuss the differences between generative and predictive AI and how to apply AI-powered technologies to help solve organizational...
AI Progress 2024: Challenges and Opport...
Artificial intelligence has quickly made it’s way to the top of technology conversations in government and industry. While the technology continues to evolve, how can you best mitigate risks and identify opportunities? Join moderator Justin Doubleday, and government and industry leaders as they discuss AI in government trends, challenges and goals for the future. Learning objectives: Trends of using AI in the government space Considering...
The Role of Deterrence of Insider Risk...
This webinar (1 of a 3-part series) will focus on deterrence, a continuous function, and critical component of a successful Insider Risk Program. Our panelists will discuss the challenges and effectiveness of the “5 Cs” of an Insider Risk Program: Communication, culture, character, compliance, and consequences.
May 21, 2024
Organizer:
ATARC Location:
Webcast
Qualys Public Sector Cyber Risk Conference
In the face of escalating attacks spanning broader scope, scale, and attrition, today’s public sector cybersecurity leaders must transition from simple compliance to more comprehensive risk management – while accelerating threat response and mean time to remediation (MTTR). From leveraging artificial intelligence-enabled automation to operationalizing zero trust, from fortifying cloud environments to mitigating supply chain vulnera...
May 21, 2024
Organizer:
Qualys Location:
Washington, DC
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
VIP START - May 2024
VIP START is a 3-day, 27-hour veteran entrepreneurship training program that is offered at NO COST to Veterans nationwide. The program is designed specifically for service-disabled and Veteran-owned small businesses interested in entering or scaling in the federal marketplace. With a curriculum created and taught by industry and subject matter experts, VIP START mitigates company risk and ensures that they are procurement ready upon graduation.
From Risk to Resilience: Leveraging Eve...
Discover the key to operational resilience and gain insights into risk intelligence at our upcoming webinar. Learn how to safeguard your operations, accelerate response times, and protect your workforce against critical events. Severe weather, Terrorism, Civil Unrest, War, OSINT and Physical threats have a crippling effect on the business. Our session will provide a comprehensive overview of strategies to manage risks and maintain continuity,...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
Threat Intel and Awareness Summit
This one-of-a-kind summit will provide value to security and compliance practitioners alike. Threat researchers and intelligence analysts from both CrowdStrike and Proofpoint will be covering the threat landscape and, how customers can best address their risk. Understanding the landscape will help customers go “beyond the checkbox” with security awareness and training. Join your Proofpoint and CrowdStrike counterparts for a Better...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.