Los Angeles CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
January 26, 2023
Organizer:
FutureCon Location:
Los Angeles, CA
FedRAMP 2023 Overview: What's New
The Federal Risk and Authorization Management Program (FedRAMP) began in 2011 to ensure the security of cloud services used by the U.S. Government. FedRAMP is a government-wide program providing a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP uses NIST guidelines in its own framework to enable U.S. Government agencies to use cloud services securely and efficientl...
Effective Market Research (MRAS)
Target Audience: Federal and Military In this course, you will learn why market research is conducted, when and how to conduct market research; the regulatory nature of FAR Part 10 and how it ties into other decisions such as acquisition planning (Part 7) small business set-asides, commercial items, contract type selection and more, and how to get better results by making your data collection methods easier. The course will use real life scena...
Modernize Applications with Azure Kuber...
Kubernetes has become a key technology for modern application development and delivery. While it may be easy to build applications in docker containers, running them in a cloud environment with operational expertise and good security is a challenge for most teams. Join our complimentary webinar on January 26th to learn about how Azure Kubernetes Service (AKS) can enable secure application delivery with containers in the cloud. AKS will allow...
Navigating the Impacts of Your Security...
Earn 1.5 CPE Credits on this webinar. The state of cybersecurity feels volatile. Despite massive worldwide spending on risk management to the tune of $150 billion, cyber attacks keep happening. Ransomware attacks doubled in 2021, with average ransomware recovery costs doubling to $1.85 million and average downtime increasing to 22 days. Within the next few years, nearly half of companies worldwide will experience cyber attacks on their softwar...
What Does Good Cloud Security Look Like?
So, you're in the cloud... what's next? Cloud applications are at the heart of digital transformation. With their scalability, ease of operationalization, and better resource utilization, it's no wonder why enterprises are turning to the cloud. With all the benefits of cloud computing come challenges and risks, so it is critical to be able to secure the crown jewel, your data. Learn how you can ensure the security and privacy of your cloud com...
Improving Operational Transfer Pricing
Sometimes being told what profit to target is the easy part. Companies faced with the challenge of implementing transfer pricing policies often consider data availability, multiple enterprise resource planning (ERP) systems, coordination with customs, limited resources, and divergent internal viewpoints. We’ll discuss: How taking a fresh look at the people, processes, and technology involved in operationalizing your transfer pricing can...
January 26, 2023
Organizer:
Deloitte Location:
Webcast
Controllership Year In Review: Finding...
As we head into a new year, it’s the perfect time to think about our resolutions, expectations, and thoughts for 2023. What is shaping the economy? What technology trends are fueling transformation? And what should Controllers know for the year ahead? We’ll discuss: Insights on events shaping the economy, their impact on finance, and next year’s economic possibilities How technology transformation continues to play a key role...
January 26, 2023
Organizer:
Deloitte Location:
Webcast
Tactics for Web App Security Using Zero...
Zero trust architecture at its core increases cyber defenses and reduces threats to data exposure, which is more critical than ever as web applications remain a top attack vector for gaining access to sensitive systems and information; attacks on web apps increased from 31.5% in 2020 to 53.6% in 2021, according to Kapersky. Fortunately, new guidance from the Department of Defense (DoD) presents seven pillars that are critical to ZTA success ...
January 26, 2023
Organizer:
ATARC Location:
Webcast
Cybersecurity Stays Front-of-Mind in 20...
The COVID-19 pandemic forced public sector agencies across the country to rely on their IT to deliver services to customers. The “forced evolution” of systems can be seen as a long-term benefit, but it also amplified the vulnerability of communities to potentially serious cyberattacks. For instance, the threat of ransomware continues to grow as cyber criminals target managed service providers, the cloud, and the software supply cha...
January 26, 2023
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.