ATARC Federal IT Modernization Virtual Summit
Tune in for ATARC’s Federal IT Modernization Virtual Summit on December 8th and 9th, from 10:00 AM - 1:15 PM ET! New ways of working have emerged, both for citizens and the government agencies serving them. Digital modernization can be described as the process of adopting new technology, and it involves upgrading systems, platforms, and software to meet today’s modern needs. When Federal agencies set out to improve their digital tr...
December 8-9, 2021
Organizer:
ATARC Location:
Webcast
Miami: (VIRTUAL and In-Person): ITAR /...
OFFERED BOTH IN A VIRTUAL FORMAT and IN-PERSON: International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities: This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States...
Performance Management Webinar
Please visit our website for the most up-to-date- information! AGA is the member organization for government financial management professionals. We lead and encourage change that benefits our field and all citizens. Our training events, professional certification, publications and ongoing education help members build their skills and advance their careers. Who we are Our members work in government financial management across sectors and worldw...
Americas OT Virtual Test Drive
Put Forescout eyeInspect (formerly SilentDefense™) through its paces during this hands-on, live event. Your instructor will help you get up to speed as you learn first-hand how eyeInspect helps you dramatically increase cyber resilience and protect your organization from whatever bad actors come your way. During this 90-minute session, you’ll perform a detailed forensic analysis of ongoing security events and discover how to automa...
December 8, 2021
Organizer:
Forescout Location:
Virtual
DOD and NATO Looking to Enlist Ethical...
Of all the consequential potential applications for artificial intelligence, nothing may rival its use by military operations. The very idea of life-and-death decision-making by AI-enabled weapons systems has induced fear in the collective social imagination for decades – the first “Terminator” movie was released in 1985.Hollywood’s deployment of special effects is lightyears beyond the capabilities of today’s AI....
December 8, 2021
Organizer:
FEDINSIDER Location:
Webcast
GCN Editorial Webcast: The Risks Beyond...
State and local governments have become increasingly attractive targets for ransomware attacks. Enhanced defenses and employee education can reduce the risks, but public sector organizations must also be prepared to respond and recover when ransomware makes it onto critical systems.The good news? Steps taken to prevent and mitigate ransomware attacks also pay dividends against a wide range of other cyber risks.In this webcast, GCN Editor-in-Ch...
How to Buy Cloud Computing for Government
This webinar shares how agencies can procure cloud computing and includes tips for migrating applications to the cloud. You’ll learn about the advantages of cloud computing and how to use GSA’s contracts to make the cloud acquisition process easier and more efficient. There’s no charge for this event! Join us to: Get valuable information about cloud computing and its benefits to government Gain an overview of how GSA helps ag...
Government Contract Issues
In the second installment of Crowell & Moring’s webinar series, our Government Contracts attorneys will discuss the impacts of the current and expected supply chain issues on federal government contractors and their compliance responsibilities. Our panelists will discuss contract clauses that may be at risk as the supply chain delays continue, including requirements for domestic preferences, prohibitions on counterfeit parts, and pro...
Auditing Cybersecurity Programs
Cybersecurity is one of the biggest internal control areas that need executive attention. You just received an urgent call from the CEO. An e-mail was received demanding $10M Bitcoin to be paid as ransom to unencrypt the company's data. "Oh no! Maybe if we audited the organization's Cybersecurity program and controls before this happened, we might not be in this mess!" Sound familiar? Hundreds of Security, Compliance and Audit professionals ha...
Becoming an Awesome New Auditor!
So, you've accepted a new position as an Internal Auditor; congratulations, and welcome to our world! Internal Auditors provide an extremely important and unique function: to independently assess controls to balance risk that may impede the objectives of an organization. We are the "last line of defense" in organizations to report risk events. Please join us for this valuable in-person, interactive training and allow our expert instructors to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.