Holistic Approach to Mitigating Insider...
This webinar focuses on a holistic approach to insider threats. Experts discuss how to prevent, mitigate, and respond to cybersecurity insider threats in all types of organizations.
April 5, 2023
Organizer:
CISA Location:
Webcast
The 3 Critical Steps to Building Situat...
Today’s federal security professionals are handling substantial amounts of sensitive data from internal and external sources. Having actionable awareness provides advantages that not only allow for better control of that data but also eases the ability to perform the meaningful analysis needed to understand and better leverage it. By attending this on demand webcast, you will learn: Get the data - ingest the data You likely have security...
April 3, 2023
Organizer:
IBM Location:
Webcast
Reinvent Readiness with Cognitive Technology
General Gustave "Gus" Perna, Commander of the Army Materiel Command, repeatedly stresses readiness as the Army’s most fundamental priority. Defined broadly as the ability of the U.S. armed forces to perform their required missions, whether against near-peer or asymmetric threats, “readiness” is shaped by many factors. These include the ability and well-being of military personnel and the availability and performance of milita...
April 3, 2023
Organizer:
IBM Location:
Webcast
Unlock the Potential of Commercial Inno...
While the U.S. federal government is developing and adopting new technologies at an unprecedented pace, it’s still challenging to capitalize on emerging technologies from the commercial sector without loosening critical security and compliance controls. How can the intelligence community embrace commercial innovation while protecting classified data? And how can our national security agencies work effectively with commercial technology i...
Risk and Reels: A Cybersecurity Podcast...
Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. WHAT IS RISK AND REELS: A CYBERSECURITY PODCAST? A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheat...
February 23, 2023
Organizer:
Black Kite Location:
Virtual
CMMC: The Most Important Certification...
CMMC: The Most Important Certification In Contract History The Department of Defense created the CMMC program to enforce cyber hygiene standards across the Defense Industrial Base supply chain. CMMC (Cybersecurity Maturity Management Certification) is a set of standards, frameworks and practices that are implemented in levels of maturity to ensure the safety of FCI (Federal Contract Information) and CUI (Covered Unclassified Information). This...
Managing Government's Risk at Scale
As NASA moves forward with its Moonshot, NASA SEWP is continuing its exploration of Supply Chain Risk Management (SCRM) and Cybersecurity Supply Chain Risk Management (C-SCRM). As one of the largest providers of technology equipment and services to government, NASA SEWP is in a unique position to bring leaders together for conversations about the latest developments and guidance, as well as innovative approaches that agencies are taking to pro...
January 30-31, 2023
Organizer:
GovExec Location:
Arlington, VA
U.S. Export Compliance Practitioner Cer...
In-depth training on EAR and ITAR regulations with real-time updates and continuous learning opportunities for a full year. U.S. Export Controls: Content Enablers, in collaboration with George Mason University's Schar School of Policy and Government, introduces the new standard for trade compliance professionals. Our online export compliance practitioner certificate courses present the in-depth, practitioner-level content required to prepare l...
Export Controlled Technology and Techni...
Course Summary U.S. Export Controls: This practitioner-level course introduces users to the regulatory requirements for identifying when technical information is export controlled and the appropriate marking of such information. It also includes the critical factors to be considered and the role an effective technology and technical data management process has in a company’s overall compliance program. The course provides an overview of...
Movement of Goods Training Series
Movement of Goods There are many intersecting challenges involved in the physical movement of goods across borders. If you (or one of your employees) are responsible for negotiating Incoterms for contracts — or executing a shipment using a particular Incoterm — you may also need to know about shipping documentation, export filing requirements, customs clearance protocols, or cargo security requirements — or maybe all of thes...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.