Securing the Cyber Supply Chain
The Executive Branch has made it clear the United States needs a more resilient and secure supply chain to ensure economic prosperity and national security. The supply chain is only truly secure when all entities throughout the public sector supply chain carry out effective and coordinated security measures to ensure the integrity of supply chain data, the safety of goods, and the security of the respective agency. This virtual workshop will r...
FCW Workshop: Cyber Strategies for 2023...
As the government moves increasingly towards digital infrastructure, geopolitical tensions rise, and individuals access more endpoints from more locations than ever before, a strong cyber posture must be embedded in everything agencies do. Policy guidance such as the cyber executive order, NIST’s updated security risk framework, and the Cyberspace Solarium’s recommendations offer strategic direction while tactical playbooks such as...
November 30, 2022
Organizer:
GovExec 360 Location:
Virtual
Continuous Diagnostics and Mitigation (...
The Continuous Diagnostics and Mitigation (CDM) program is a way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to provide government agencies with risk-based cybersecurity solutions to protect federal civilian networks across organizational tiers. Specifically, CDM helps federal agencies identify cybersecurity risks, prioritize those risks, and enable staff to focus on those prior...
Update: Continuous Diagnostics And Moni...
The Continuous Diagnostics and Mitigation (CDM) program is the way government agencies move toward fortifying their cybersecurity networks and systems. It was developed in 2012 to support government-wide risk-based cybersecurity solutions to assist participating agencies improve their security posture consistently and cost-effectively. In this virtual workshop, government & industry experts will provide the following: a status update on CD...
Zero Trust: The Fundamentals
Zero Trust is a key component of every federal IT initiative and modernization effort. The Executive Order on Improving the Nation’s Cybersecurity, the CISA Zero Trust Maturity Model, the DISA Zero Trust Architecture, and various NIST guidance all include mission critical elements for zero trust implementation. Although the principals of Zero Trust are widely accepted, the implementation process is a detailed and time-consuming process....
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
Auditing Cyber Security Programs (24 CPEs)
4, ba Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Au...
ITGC'S Audit Planning Thru Reporting (1...
4, ba Are your ITGC audits really helping to reduce your cybersecurity risks? This CPE internal auditor training event is designed for the financial auditor and IT auditor who need to improve their practical knowledge covering information technology general controls (ITGC). The attendees are walked through the concepts and frameworks that are important to the ITGC internal audit activities in order to create an added value for their organizati...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.