Back to Search Begin New Search Save Search Auto-Notify
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs Get Certified in Cloud Security with CCSK v5 Plus Certification TrainingAdvance your career and strengthen your cloud security expertise with CCSK Certification Training—a globally recognized certification from the Cloud Security Alliance (CSA). Our comprehensive CCSK v5 Plus Training course fully prepares you for the Certificate of Cloud Security Knowledge (CCSK) exam with i...
January 13-15, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
January 13-17, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Washington DC SASE Summit - A Federal E...
Networking, Security, and Zero Trust: A Federal Evolution Join us for a one-day event where we’ll explore the advantages of a unified network and security-as-a-service platform. Discover how to kickstart or elevate your agency’s journey toward meeting the unique demands of SASE and Zero Trust frameworks tailored for government needs. Gain insights into the power of Netskope One and learn how government agencies can unlock seamless...
January 15, 2025
Organizer: Netskope
Location: Washington, DC
Add Favorite
Cyber Resilience for the Defense ...
Effective cybersecurity requires collaboration across IT infrastructure, security, and data protection, since each team has distinct roles and responsibilities. Integrating IT infrastructure, data protection, and data security provides significant value by offering a unified perspective on user activity, data monitoring, and data access during a cybersecurity incident. By understanding the data—its location, accessibility, and how to res...
January 22, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Resilient and Camouflaged Communication...
In high-stakes environments, secure and reliable communication can mean the difference between mission success and failure. Join Dominic Perez, CTO of Curtiss-Wright Defense Solutions and Timothy Hillner, CTO of Fairwinds Technologies, as they delve into advanced strategies for ensuring resilient communications for forward deployed teams. This webinar will explore innovative approaches to safeguard data and maintain connectivity, even in hosti...
January 22, 2025
Organizer: AFCEA International | Signal
Location: Webcast
Add Favorite
Data Modeling for State & Local Governments
If a picture is worth a thousand words, turning data into graphical images that show relationships must be just as valuable. Agencies across the country, looking for ways to better leverage the value of the data they already gather, are wrestling with how to implement data modeling to make use of the information. There are four key areas where data modeling tools provide value: Data governance and compliance is easier when a data modeling tool...
January 23, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Revolutionizing Federal IT: The Power o...
Federal leaders feel immense pressure to modernize legacy applications to improve user experiences and accelerate mission outcomes. As Americans’ expectations of government services continues to grow, harnessing generative AI (GenAI) provides leaders with opportunities to improve delivery through streamlined software development, enhanced workforce efficiency, and strategic decision-making. Harnessing AI is a useful way to advance modern...
January 29, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
February 3-7, 2025
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CyberSmart 2025: From A to Z
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office. For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to...
February 6, 2025
Organizer: FedInsider
Location: Reston, VA
Add Favorite
CMMC 2.0: What DoD Contractors Need to Know
2025 promises to be a very busy year for the Department of Defense (DoD) and its contractors. In October 2024 the department issued a new rule implementing the Cybersecurity Maturity Model Certification (CMMC) 2.0 program, requiring contractors to implement required security measures to protect federal contract information (FCI) and controlled unclassified information (CUI). The rule rolls out the requirements in four phases over the course of...
February 6, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
Back to Search Begin New Search