Back to Search Begin New Search Save Search Auto-Notify
PCAOB Auditing Standard 2105: Considera...
This PCAOB Auditing Standard 2105: Consideration of Materiality in Planning and Performing an Audit establishes requirements regarding the auditor's consideration of materiality in planning and performing an audit. In interpreting the federal securities laws, the U.S. Supreme Court has held that a fact is material if there is "a substantial likelihood that the . . . fact would have been viewed by the reasonable investor as having significantly...
October 11, 2021
Organizer: Corporate Compliance Seminars
Location: Virtual
Add Favorite
PCAOB Auditing Standard 1300: Auditor C...
This training event covers the two different subsections of the PCAOB Auditing Standard 1300. PCAOB Auditing Standard 1301: Communications with Audit Committees requires the auditor to communicate with the company's audit committee regarding certain matters related to the conduct of an audit and to obtain certain information from the audit committee relevant to the audit. PCAOB Auditing Standard 1305: Communications About Control Deficiencies...
October 11, 2021
Organizer: Corporate Compliance Seminars
Location: Virtual
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for these five one-hour webinars spread over five days,...
October 8, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
THIR Summit Solutions Track
Theres a high chance that hidden threats already exist inside your organization's networks. No matter how thorough and sophisticated an organizations security precautions may be, it cannot assume that its security measures are impenetrable. By themselves, prevention systems are insufficient to counter focused human adversaries who know how to get around today's advanced security and monitoring tools. It takes highly skilled and focused hunters...
October 8, 2021
Organizer: SANS Institute
Location: Webcast
Add Favorite
FCW Government Voice Webcast: Cloud Can...
Agencies modernizing their legacy systems are increasingly looking to the cloud for solutions that can help simplify and accelerate the process. Along with flexible, capable services, the cloud also offers a way to control costs and insure continuous network operations. As the migration to the cloud moves ahead, agencies are relying on multi-cloud, platform-as-a-service, as well as software-as-a-service solutions to help avoid the wholesale ...
October 7, 2021
Organizer: Public Sector 360
Location: Webcast
Add Favorite
Cyber Security Virtual Conference: Ransomware
Ransomware is a form of malware designed to encrypt data files rendering any files on the computing device unusable. Once files are encrypted a ransom is demanded in exchange for decryption keys. Ransomware is a major ongoing security problem and a growing national security threat. Government agencies are organizing on numerous fronts to combat ransomware. On July 15, 2021 the U.S. Government launched a new One-Stop Ransomware resource at stop...
October 7, 2021
Organizer: Digital Government Institute
Location: Webcast
Add Favorite
Headlines in Cybersecurity: What States...
The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege. Join us for five one-hour webinars spread over five days, as tho...
October 7, 2021
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Making IT Service Management and Securi...
It’s no secret that getting a clear picture of your hardware, software, and services can be a challenge. Federal IT leaders frequently list vendor audits and unexpected software license true-up as a top concern. Add to the mix – constant adaptation to changing technologies, cyber-attack vulnerability mitigation, and IT asset availability and management in complex hybrid environments – and you start to uncover the challenges i...
October 7, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Dallas Cybersecurity Conference
Since 1999, Data Connectors has facilitated the collaboration between cybersecurity professionals and solution providers. Today, the community is comprised of over 650,000 members and 200 active vendor partners. Members enjoy informative education from industry luminaries, innovative solution providers and government agencies such as the FBI, InfraGard, US Secret Service and the Department of Homeland Security. Data Connectors brings live conf...
October 6-7, 2021
Organizer: Data Connectors
Location: Dallas, TX
Add Favorite
U.S. Cyber Challenge Awards Program and...
The U.S. Cyber Challenge serves as a premier program to identify, attract, recruit, train, and place the next generation of cybersecurity professionals. Top performers from different colleges and universities are offered award winning training from top instructors on new concepts and approaches. During the cyber camps in the summer, those who qualify participate in discussions with leaders in the cyber field and teams are formed where they com...
October 6, 2021
Organizer: ACT-IAC
Location: Virtual
Add Favorite
Back to Search Begin New Search