Back to Search Begin New Search Save Search Auto-Notify
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Cyber Security Training at SANS San Ant...
Unlock the full potential of your career with cyber security training at SANS SANS San Antonio 2024 (June 24-29, CT). Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical application in...
June 24-29, 2024
Organizer: SANS Institute
Location: San Antonio, TX
Add Favorite
Orange County Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
June 27, 2024
Organizer: FutureCon
Location: Anaheim, CA
Add Favorite
Neurodiversity in Cybersecurity Summit 2024
As the cybersecurity talent shortage persists, with an estimated 700,000 unfilled jobs, the industry needs to redouble its efforts to attract and retain workers. One important way to accomplish this is by recognizing that jobs and workplaces can’t be “one size fits all.” As many as 20% of adults are neurodivergent (ND), and when we fail to account for the unique strengths, experiences, and challenges of neurodivergent cyberse...
June 27, 2024
Organizer: SANS Institute
Location: Virtual
Add Favorite
Nextgov/FCW Supply Chain Workshop
Proper supply chain management and national security concerns have never been more interconnected. As geopolitical tensions bring cyber threats to the fore, the public and private sector must collaborate to ensure each link of the supply chain is secure. And everyone in the organization, from developers to senior leadership, must prioritize risk management across the entire threat landscape. Because cybersecurity risks can arise at any point i...
June 27, 2024
Organizer: GovExec
Location: Virtual
Add Favorite
Zero Trust in Action: Approaches to Mob...
In today’s rapidly evolving cybersecurity landscape, Zero Trust has emerged as a critical strategy to defend organizational assets against persistent cyber threats. However, the presence of mobile devices in enterprise environments poses significant challenges to traditional Zero Trust implementations. As government agencies increasingly rely on mobile devices to conduct business and communicate, ensuring the security of these endpoints...
June 27, 2024
Organizer: ATARC
Location: Webcast
Add Favorite
Securing the Municipal Water Supply fro...
Foreign nation state-sponsored cyber group and threat actors affiliated with the Iranian Government have carried out malicious cyber-attacks against multiple critical infrastructure entities; this and other nation state “bad actors” have their eyes on this precious resource. In one case, hackers targeted and disabled a common operational technology (OT) used at water facilities. Unfortunately, these facilities often lack the resour...
June 27, 2024
Organizer: Semperis Government Team at Carahsoft
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Boosting Data Security & Cyber Resilien...
All the elements of the U.S. healthcare system are under siege by hackers. A recent article in Modern Healthcare reported that “[o]ver the past five years, there’s been a 256% increase in large breaches reported to [the U.S. Department of Health and Human Services] involving hacking and a 264% increase in ransomware.” Federal health agencies face the same risks – and private-sector attacks ripple through the agencies, a...
July 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search