CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Cyber Security Training at SANS San Ant...
Unlock the full potential of your career with cyber security training at SANS SANS San Antonio 2024 (June 24-29, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in...
Orange County Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
June 27, 2024
Organizer:
FutureCon Location:
Anaheim, CA
Maximum ACFR Automation for States, Lar...
Join Workiva on June 27th, to learn why and how the largest, most complex public sector organizations are leveraging technology to drive efficiency —automating journal entries, GAAP/Closing packages, GASB 87/96/94, and reducing ACFR preparation time by 50+ percent. During this webinar, attendees will: Learn why these organizations are prioritizing productivity improvement for their finance teams. Discover how collecting, compiling, and a...
Neurodiversity in Cybersecurity Summit 2024
As the cybersecurity talent shortage persists, with an estimated 700,000 unfilled jobs, the industry needs to redouble its efforts to attract and retain workers. One important way to accomplish this is by recognizing that jobs and workplaces can’t be “one size fits all.” As many as 20% of adults are neurodivergent (ND), and when we fail to account for the unique strengths, experiences, and challenges of neurodivergent cyberse...
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer:
GovExec Location:
Virtual
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer:
ATARC Location:
Webcast
Effective Market Research (MRAS)
Target Audience: Federal/State/Local Agencies and Military Attention all public sector employees in the contracting and acquisition career field! In GSA's Market Research As a Service (MRAS) Customer Training: Effective Market Research (Fed/Military), you'll learn the importance of market research, how and when to conduct it, and how to get the best results by making your data collection methods more efficient. You'll also delve into the regul...
End-of-Life IT & Spilled Data Raises Br...
Blancco and Carahsoft are excited to invite you to join us in the lead up to TechNet Cyber 2024 to explore how your team can innovate, adapt and collaborate in service of your mission goals by utilizing emerging technologies. Join Carahsoft and Blancco to hear how to redeploy government computer drives, assets, devices and other hardware to lower costs and provide increased value to federal agencies. Whereas the stored data must be completely...
Securing the Municipal Water Supply fro...
Foreign nation state-sponsored cyber group and threat actors affiliated with the Iranian Government have carried out malicious cyber-attacks against multiple critical infrastructure entities; this and other nation state “bad actors” have their eyes on this precious resource. In one case, hackers targeted and disabled a common operational technology (OT) used at water facilities. Unfortunately, these facilities often lack the resour...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.