Back to Search Begin New Search Save Search Auto-Notify
"Frauditing" Internal Controls to Preve...
Cybersecurity challenges demand that an organization face two facts. First, the protection of critical company and customer information is a business requirement to protect the company's reputation and enterprise value. Second, even the best programs will experience failure and expose some information the company would like to protect. We at Corporate Compliance Seminars believe confidence in security and privacy does not come from knowing not...
April 28, 2020
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
Understanding Cybersecurity Risks
Cybersecurity challenges demand that an organization face two facts. First, the protection of critical company and customer information is a business requirement to protect the company's reputation and enterprise value. Second, even the best programs will experience failure and expose some information the company would like to protect. We at Corporate Compliance Seminars believe confidence in security and privacy does not come from knowing not...
April 27, 2020
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
CyberCast: Secure Remote Access for Adm...
YOU’VE SECURED THE WORKFORCE, NOW SECURE PRIVILEGED ACCESS. Current work-from-home requirements have resulted in organizations enabling entire workforces for remote access. As the FBI and other agencies report, this is a boon for cyber attackers who see this expanded attack surface as a feeding frenzy opportunity. Organizations of all sizes are at increased risk and need to secure remote access for privileged users, whose identities can...
April 17, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
CMMC/NIST 800-171, What You Need To Know
CMMC is coming. Since the focus is protecting Critical Unclassified Info (CUI), what data protections are you putting in place… and for what data? We discuss why CMMC and NIST 800-171 data protection controls should be at the heart of your strategy | what a data stewardship model for the DIB looks like | and the respective Government & Industry roles and responsibilities for protecting critical info. This is the second session in th...
April 16, 2020
Organizer: RockITek, LLC
Location: Webcast
Add Favorite
Risk Management Case Study: The Fire at...
A year ago this April 15th, the world watched in horror as fire raged at Notre Dame Cathedral in Paris. When the soaring spire atop the cathedral tipped and then collapsed into the flames, fears grew at whether Notre Dame could survive. Thankfully, the efforts and strategic thinking of the brave women and men of the Paris fire brigade, which kept the fire from overtaking the church’s two towers, enabled the main structure to be saved, al...
April 15, 2020
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
What's Working in the COVID-19 Response...
Maps and location data have been at the forefront of the COVID-19 response. The geographic information systems (GIS) community has been able to take the lessons learned from disaster response and transfer this knowledge quickly, to carry out meaningful impacts. GIS is helping communities make more data-driven decisions, allocate much-needed resources, and keep the public informed during the coronavirus outbreak. Join us online Tuesday, April 7...
April 7, 2020
Organizer: GovLoop
Location: Webcast
Add Favorite
Certified Government Meeting Profession...
To protect the health and safety of attendees, this event has been postponed due to COVID-19 concerns. The Certified Government Meeting Professional Course is to earn the CGMP designation and is designed for government meeting planners and suppliers whose work is governed by the rules and regulations of the federal government. While the curriculum is written from Federal rules, regulations, and laws, state and local government employees will b...
March 31 - April 3, 2020
Organizer: SGMP
Location: Alexandria, VA
Add Favorite
Security Criteria Development: Exceedin...
A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also learn ho...
March 3-5, 2020
Organizer: Haines Security Solutions
Location: Tampa, FL
Add Favorite
The Anatomy of a Hack: Perception vs. Reality
Learn the anatomy of a hack.Prevent a data breach. It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place. Hackers don't break in. They log in! Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it: 74 percent of respondents acknowled...
February 13, 2020
Organizer: Centrify
Location: Webcast
Add Favorite
Certified Government Meeting Profession...
The Certified Government Meeting Professional Course is to earn the CGMP designation and is designed for government meeting planners and suppliers whose work is governed by the rules and regulations of the federal government. While the curriculum is written from Federal rules, regulations, and laws, state and local government employees will benefit from this information. Individuals who have earned their CGMP have obtained the highest designat...
February 7-10, 2020
Organizer: SGMP
Location: Washington, DC
Add Favorite
Back to Search Begin New Search