Back to Search Begin New Search Save Search Auto-Notify
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
June 24-28, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Choosing the Right Mobile App Security...
In today's rapidly evolving digital landscape, securing mobile applications is more critical than ever for enterprises. As cyber threats become increasingly sophisticated, organizations must carefully consider their approach to mobile app security. Should they adopt a comprehensive platform solution or opt for best-of-breed tools tailored to specific needs?Join us for an insightful webinar with GigaOm’s Howard Holton. We will explore the...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
State & Local Cybersecurity for the 202...
Election security is top of mind across the United States, from concern about malign foreign interference, to DDoS attacks against election websites, to the security of voting machines and their software, to insider and third-party threats, even to “swatting” of local election officials, to name just a few. At the heart of all these threats is the intent to change the outcome of political races. Outcomes, in the end, are determined...
June 27, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Zero Trust in Action: Approaches to Mob...
Government agencies increasingly rely on mobile devices, making endpoint security crucial. This panel features government officials discussing innovative strategies to address mobile cyber threats within a Zero Trust framework. Learn how mobile security is vital to enhancing the effectiveness of a Zero Trust Architecture, providing stringent verification mechanisms to ensure the integrity of user and device access to critical resources. From i...
June 27, 2024
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Strategies for Teaming To Win Governmen...
Strategies for Teaming To Win With Five Agreements PROGRAM MATERIALS: To Promote Training, Attendees Will Receive The Following Sample Standard Forms: A Nondisclosure Agreement A Teaming Agreement A ID/IQ Subcontract Agreement A SBA Joint Venture Operating Agreement A Contractor Teaming Arrangement Agreement (“CTA”) Due to demand, early-bird prices are subject to substantial increase. Register now! OVERVIEW: Small businesses utili...
June 28, 2024
Organizer: Deale Services
Location: Webcast
Add Favorite
Cloud Safe Task Force: Delivering the N...
The Cloud Safe Task Force (CSTF) recommends establishing a National Cyber Feed (NCF) — a public-private collaborative effort for comprehensive situational awareness of cyber threats and responses, fed by real-time security information from major U.S. cloud service providers (CSPs) and used by leading federal cybersecurity organizations including the Office of the National Cyber Director (ONCD), Office of the Federal Chief Information Off...
July 1, 2024
Organizer: ATARC
Location: Virtual
Add Favorite
Boosting Data Security & Cyber Resilien...
All the elements of the U.S. healthcare system are under siege by hackers. A recent article in Modern Healthcare reported that “[o]ver the past five years, there’s been a 256% increase in large breaches reported to [the U.S. Department of Health and Human Services] involving hacking and a 264% increase in ransomware.” Federal health agencies face the same risks – and private-sector attacks ripple through the agencies, a...
July 9, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
CDM Success Stories in an Age of Cyber-...
The cyber-attack surface has exploded to include more than just hardware and on premises devices. This can make implementing CDM and achieving success even more difficult-- one of the most common challenges has always been finding the time and resources to do so. So how are agency cyber leaders keeping up? While the Cybersecurity and Infrastructure Security Agency’s Continuous Diagnostics and Mitigation (CDM) program is now a dozen years...
July 10, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Assessing Controls in Performance Audits
Internal control is an important focus for auditors as they commonly identify weaknesses in internal controls as an underlying cause of organizations struggling to deliver effective and efficient results. Through lecture, group discussions, and case studies, this course provides auditors with a comprehensive understanding of the five components of internal control and the 17 underlying principles. The course will explain the audit planning and...
July 10-11, 2024
Organizer: Parker CPE
Location: Webcast
Add Favorite
reStartEvents Nationwide TS/SCI ...
Do you possess an active TS/SCI, CI Poly or Full Scope Poly Security Clearance & looking for your next Cleared Career Opportunity? Join us at the reStartEvents Nationwide TS/SCI & Above Cleared Virtual Career Fair on July 11th and engage with hiring managers and recruiters from some of the nation's leading defense contractors, all from the safety and comfort of your home or office. Accomplish what it would take weeks to do, ALL in one...
July 11, 2024
Organizer: reStartEvents.com, Inc.
Location: Virtual
Add Favorite
Back to Search Begin New Search