Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive p...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Security and Privacy Controls (NIST SP...
Are you looking to enhance your knowledge of security and privacy controls? Join our upcoming 4 CPE event focused on Security and Privacy Controls based on NIST SP 800-53 Revision 2 (R2). This event will provide you with valuable insights into the recommended security controls for federal information systems. NIST Special Publication (SP) 800-53 Revision 2 offers specific guidance on the application of security controls to Industrial Control...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Mastering Automation with Okta Workflow...
Take your identity automation to the next level! Join Okta on January 15th to explore how Workflows can revolutionize the way you manage identity processes—no coding required.In this interactive session, you'll:Get a comprehensive overview of Okta WorkflowsDiscover real-world use cases to inspire your automation journeySee a live demo of Workflows in actionWhy Attend?Okta Workflows empowers you to automate even the most complex identity...
Inspection & Assessment of Dams
This seminar provides comprehensive instruction in inspection and evaluation techniques for dams. The principles, concepts and procedures taught will be readily adaptable to any organization conducting dam inspections and evaluating their compliance with current design standards. Participants learn about a variety of dam types and their appurtenances, the function of typical dam features, and common dam failure modes and the conditions that ca...
F5 Lab Day API Security: Capture the Flag
Are you ready to roll up your sleeves, crack a Red Bull, and see if you have what it takes to Capture the Flag? Join the F5 DISA team for an interactive Capture the Flag competition where you will compete against others to hunt for API vulnerabilities and learn how they work. See who has what it takes to identify vulnerable APIs and ultimately Capture the Flag! In this lab and Capture the Flag exercise, you will learn how to identify and mitig...
CyberSmart 2025: From A to Z
Federal agencies understand that cybersecurity has to be the foundation of their operations, from online to back office. For instance, the telecommunications breach by Salt Typhoon, a Chinese government-backed hacking group, targeted both U.S. political leaders and national security information. First detected in early summer, in December the Cybersecurity and Infrastructure Security Agency (CISA) said at a press conference there is no way to...
February 6, 2025
Organizer:
FedInsider Location:
Reston, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.