Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Security and Privacy Controls (NIST SP...
Are you looking to enhance your knowledge of security and privacy controls? Join our upcoming 4 CPE event focused on Security and Privacy Controls based on NIST SP 800-53 Revision 2 (R2). This event will provide you with valuable insights into the recommended security controls for federal information systems. NIST Special Publication (SP) 800-53 Revision 2 offers specific guidance on the application of security controls to Industrial Control...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
CyberSmart 2025: From A to Z
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office. For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to...
February 6, 2025
Organizer:
FedInsider Location:
Reston, VA
Nexus 2025
February 9-12, 2025, NCMA's Nexus will be at the Long Beach Convention Center in Long Beach, CA to convene the entire acquisition team to support our mission to advance contract management’s nexus with related acquisition communities. This event will dive deep into executing beyond OFPP Myth-Busting, forging future buyer-seller relationships, and conducting meaningful market research that leads to real solutions. It’s all abo...
February 9-12, 2025
Organizer:
NCMA Location:
Long Beach, CA
Zero Trust Summit
As federal agencies meet early deadlines for zero-trust adoption set in motion by the Biden administration’s executive order on cybersecurity and related mandates, it's becoming clear that achieving this basic level of zero-trust security isn't an end state — instead, it's the first step on a continued journey. And, as more and more transformation and innovation are introduced into the federal tech marketplace, agencies now have op...
February 19, 2025
Organizer:
CyberScoop Location:
Washington, DC
Elastic - Public Sector Summit' 25
For public sector organizations, data is an abundant and invaluable resource — but only if it can be securely leveraged to drive mission value. In the age of AI, as the volume and velocity of data grow at unprecedented levels, leaders face new challenges sifting through that massive amount of data to transform their mission operations. Join top federal program executives and IT leaders to learn firsthand how advances in data management,...
DefenseTalks
The global landscape is shifting and advanced technologies are reshaping the modern battlefield. To maintain its edge, the U.S. military must harness the power of data, AI and other innovative technologies to drive faster, smarter, and more decisive action and deter threats from advanced strategic competitors like China and Russia. With seismic geopolitical shifts at play, the Department of Defense is going all-in on concepts like zero trust t...
June 5, 2025
Organizer:
DefenseScoop Location:
Washington, DC
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.