Back to Search Begin New Search Save Search Auto-Notify
CMMC 2.0: What's Changed and What's Next
When DOD rolled out its Cybersecurity Maturity Model Certification program in 2020, it was designed to secure the Controlled Unclassified Information (CUI) in systems used by contractors in Defense Industrial Base that support business and warfighting efforts. Initially, an independent accreditation body was to certify a group of third-party assessment organizations. The plan ran into a number of obstacles as industry organizations questioned...
July 28, 2022
Organizer: GovExec 360
Location: Virtual
Add Favorite
FFIEC Cybersecurity Assessment Tool (16 CPEs)
Does your bank have the right level of maturity for your Cybersecurity Risk Management activities compared to the inherent risk levels? The FFIEC Cybersecurity Assessment Tool (CAT) is a diagnostic testing tool that helps internal auditors identify a bank's level of inherent risk and determine the maturity level of their cybersecurity programs. This training course looks at the way cybersecurity inherent risks can vary significantly based on t...
May 23-25, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
FFIEC Cybersecurity Assessment Tool (16 CPEs)
Does your bank have the right level of maturity for your Cybersecurity Risk Management activities compared to the inherent risk levels? The FFIEC Cybersecurity Assessment Tool (CAT) is a diagnostic testing tool that helps internal auditors identify a bank's level of inherent risk and determine the maturity level of their cybersecurity programs. This training course looks at the way cybersecurity inherent risks can vary significantly based on t...
April 18-20, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
VMware Public Sector Innovation Summit 2022
In recent years, public sector organizations have reinvented themselves as digital enterprises built on modern applications and multiple clouds. As a result, constituents and end users have benefited from faster, more reliable services and tools. But as an organization’s technology shifts, so should its processes and workforce – for both IT and line of business. A true multi-cloud strategy requires a comprehensive, all-hands-on-de...
April 14, 2022
Organizer: FedScoop
Location: Arlington, VA
Add Favorite
Cybersecurity Tools and Techniques for...
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
March 21-23, 2022
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
SANS Cyber Security Mountain: Feb 2022
Interactive Cyber Security Training Taught by Industry ExpertsJoin us Live Online for interactive training during SANS Cyber Security Mountain 2022 (Feb 14-19, MST) to learn directly from real-world practitioners and develop invaluable cyber security skills. Choose your course and register now for immersive training with hands-on labs, plus opportunities to network with your peers. SANS Cyber Security Mountain 2022 Features Practical cyber sec...
February 14-19, 2022
Organizer: SANS Institute
Location: Virtual
Add Favorite
Priority 1: Strengthening and Empowerin...
The President’s Management Agenda’s three-pronged vision outlines specific changes to the Federal government’s workforce, customer experience, and management of businesses. Priority 1’s focus on the American workforce challenges government agencies to become model employers in terms of diversifying their workforce and the support they provide those employees. Recruiting and retaining the best and brightest means ensurin...
February 10, 2022
Organizer: ATARC
Location: Webcast
Add Favorite
ICIT 2022 I Rising Threat Alert: DDOS A...
ICIT 2022 Rising Threat Alert: DDOS Attacks and What Stops Them When it comes to DDoS crimes, there’s no such thing as questions, just hidden answers. This virtual briefing will provide a crime scene investigation of today’s DDoS criminals. Answering questions such as how are attacks launched and why aren’t they getting detected and stopped in time? The panelists will continue the investigation by turning the lens to the vict...
January 13, 2022
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
ICIT 2021 Fall Briefing-- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
November 30, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
ICIT 2021 Fall Briefing -- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
November 23, 2021
Organizer: Institute for Critical Infrastructure Technology
Location: Virtual
Add Favorite
Back to Search Begin New Search