The Urgency of API Security
Cybersecurity professionals are well aware that the threat landscape they live in is volatile and poses ever-changing threats to the systems they defend. One kind of risk is exploding – attacks on APIs. APIs are such attractive targets because their purpose is to allow two or more applications to communicate with each other. Infecting an API drastically expands the attack surface, but most enterprises do not have transparency into their...
August 15, 2023
Organizer:
FEDINSIDER Location:
Webcast
FCL-GSA-0023 Basic Contracting for GSA...
Target Audience: Federal Agency and Military This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C L...
VETS 2 DPA Training
Learn how the VETS 2 GWAC can support your agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA). Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project in...
The New EU-U.S. Data Privacy Framework:...
On July 10, 2023, after years of negotiations between the European Commission and the United States government, the long-awaited, latest data protection adequacy decision for the U.S. was announced and took immediate effect—in the form of the new EU-U.S. Data Privacy Framework. This means that U.S. companies may now self-certify their adherence to the new Framework’s Principles to lawfully receive EU data subjects’ personal d...
Identity Security Workshop
Identity is at the center of cybersecurity. With zero trust now the mandated de facto approach to strengthening cyber defenses, federal, state and local agencies need to build an identity-centric security approach encompassing both human and machine identities. This requires an enterprise wise rethinking of authentication, authorization, access to data, auditing and accountability in order to protect the IT backbone powering government. Identi...
August 15, 2023
Organizer:
Nextgov/FCW Location:
Virtual
2023 Government Financial Management Co...
The Government Financial Management Conference (GFMC) Virtual will be held on August 14-15, 2023, starting 9 AM EST on both days. View our brochure. The GFMC Virtual provides a forum for those in the federal financial management community to learn about current issues, exchange knowledge, and share experiences in improving financial management operations and policies. All educational sessions will be led by federal financial management experts...
NVIDIA DLI Workshop: Fundamentals of Ac...
The world of cyber operations is complex and multifaceted with new threats and challenges emerging constantly. Generative AI and Large Language Models, like ChatGPT, have escalated the frequency and complexity of cyber-attacks. At its core, cyber is a data science problem, and data science workloads must be accelerated before a cyber operator can begin applying artificial intelligence to cyber problems. Cyber technologists and data scientists...
New Compliance Risks Posed by AI
ChatGPT! Bard! Midjourney! Machine Learning! Neural Networks! With the recent explosion of available AI tools, many organizations and their employees have been busy exploring ways that AI can be used to improve efficiency and results. However, all of these new tools – and the incredible speed with which they are being developed, updated, and rolled out – could also present a new set of risks that many organizations are only beginni...
Indianapolis Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
August 10, 2023
Organizer:
FutureCon Location:
Indianapolis, IN
Zero Trust: Driving Transformation and...
Federal agencies across government have started the shift in mindset from just patching and remediation to truly transformative cybersecurity modernization. There is no better example than the move to developing zero trust architecture governmentwide. While every agency is in a different stage of its ZT implementation journey, there are key guideposts and best practices that every federal IT and security team should be following to optimize th...
August 10, 2023
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.