Denver Cyber Security Summit
The Sixth Annual Denver Cyber Security Summit returns on May 5th, In-Person at the Hilton Denver City Center and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Cat...
Health Innovation Summit 2022
This Summit is now in it’s fifth year and is produced in partnership between ACT-IAC and the HIMSS NCA Chapter. With transitions occurring in healthcare, are you wondering what changes are being planned for the future, in 2022, 2025, 2030 and beyond? Healthcare landscape is ever-changing. From the many articles written, healthcare in the next five to ten years will be delivered through integrated ecosystems that include updated policies,...
May 5, 2022
Organizer:
ACT-IAC Location:
Arlington, VA
How GE Healthcare Plans to Accelerate A...
The May 2022 Enterprise Data & AI featured guest speaker is Vignesh Shetty, SVP & GM, Edison Platform & Artificial Intelligence at GE Healthcare and his presentation ‘How GE Healthcare Plans to Accelerate AI with a Digital Health Platform’ on Thursday, May 5, 2022 from 11:30 AM - 1 PM ET! In heavily regulated industries such as healthcare, digital innovation can be slow to progress. However, once organizations push towa...
Colonial Pipeline in Retrospect: Securi...
Approximately 87% of critical infrastructure is owned by the private sector, so how can the government help defend it in cyberspace, especially against nation-state adversaries such as Russia and China? The Biden Executive Order, extended 100-day action plan, and other directives call for private-public collaboration to protect the nation’s grid, water/wastewater facilities, and pipelines, but how do you take action to implement shared d...
May 5, 2022
Organizer:
ATARC Location:
Webcast
Secure Miami 2022 Conference
*Registration opening soon! There’s no doubt the COVID-19 pandemic has been a catalyst for wider, faster change within the cybersecurity threat landscape. With this sudden rise in threat activity, along with more sophisticated threat actors, we have entered a new age of cybersecurity that demands we confront threats with renewed resilience, agility and innovation. With this in mind, we are pleased to announce Secure Miami returns in-pers...
Secure Miami Cybersecurity Conference 2022
There’s no doubt the COVID-19 pandemic has been a catalyst for wider, faster change within the cybersecurity threat landscape. With this sudden rise in threat activity, along with more sophisticated threat actors, we have entered a new age of cybersecurity that demands we confront threats with renewed resilience, agility and innovation. With this in mind, we are pleased to announce Secure Miami returns in-person with a virtual component...
Network Modernization at the Edge
Several Russian generals have been killed in Ukraine because their soldiers have been forced to rely on communications “in the clear,” on regular cellphones and handheld radios. But that does not necessarily translate into a permanent tactical advantage for the Ukrainians – Russia is also known for its hacking skills. If their secure communications are breached, Ukrainian forces also can be at risk. There is no more timely ex...
May 5, 2022
Organizer:
FEDINSIDER Location:
Webcast
Contract Lifecycle Management: Time for...
Private companies can find it difficult to manage hundreds or thousands of vendor, supplier, customer, and employee contracts. The pandemic has introduced unprecedented new challenges. Are your contract lifecycle management (CLM) approach and technology keeping pace? We’ll discuss: Common CLM challenges, including contract volume, manual and repetitive processes, and poor contract visibility Selecting CLM technology, including requiremen...
May 5, 2022
Organizer:
Deloitte Location:
Webcast
FCW Workshop: Zero Trust Marching Order...
With cyberattacks on the increase at all levels of government, The White House issued a new executive order at the end of January that requires agencies to have a zero trust architecture in place by the end of FY 2024. The Office of Management and Budget followed with a memorandum (M-22-09) that laid out the requirements agencies must meet and the deadlines for completing the tasks outlined in the document. OMB identified five areas of focus--...
May 4, 2022
Organizer:
GovExec Location:
Washington, DC
The GAO Green Book Compliance Academy (...
A Practical Approach to Internal Controls under the GAO Green Book. Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013) from the Committee of Sponsoring Organizations of the Treadway Commission (COSO). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the G...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.