Forensic and Investigative Accounting (...
4, ba Forensic accounting is a specialty practice area where accounting, auditing and investigative skills are used to analyze and present information that is suitable for use in a court of law. Topics covered include fraud detection and fraud investigation techniques, valuation of closely held businesses, lost profits analyses, and various types of litigation support services. Fundamental legal concepts governing expert witness testimony are...
IP Rights Issues in Source Selections,...
The Nash & Gray virtual class series provides access to two experts in Government Contracting Intellectual Property law and policy, on a monthly basis. The sessions will dive deep into important and timely issues related to IP and Data Rights for government employees and contractors. And, of course, bring your questions to the sessions.
Why Now? 3 Reasons Why AI for Risk Redu...
Economic uncertainty has created a perfect storm for an increase in financial crimes. For organizations that are still performing AML/KYC compliance checks without assistance from articiial intelligence (AI), the time has come to rethink that unsustainable approach. Financial criminals have long been using AI to attack financial networks, and until FIs started using the same technology to fight back, they will always be playing catch up. If yo...
Identity: The First Pillar of Zero Trust
Zero trust is vital for our nation's cybersecurity modernization, as reinforced by Executive Order 14028. To accelerate adoption, CISA drafted a simple Maturity Model that provides five pillars of zero trust: Identity, Device, Network, Workload, and Data. Even with a simple model to follow, a zero trust journey can be long and complicated-- but it doesn't have to be. In this engaging session, you'll learn: Why Identity is Pillar #1 How Identit...
Taking Zero Trust to the Next Level of...
Cyber threats to federal agencies continue to evolve, requiring equal agility in defending against them. To address the scope of the risk, the White House released Executive Order (EO) 14028 on improving the nation’s cybersecurity in May 2021. It outlined security best practices, including how the federal government must advance toward a zero trust architecture to keep pace with today’s dynamic and increasingly complex cyber threat...
September 13, 2022
Organizer:
FEDINSIDER Location:
Webcast
Federal Identity Forum and Exposition 2022
Formerly known as the Global Identity Summit, the Federal Identity Forum & Exposition (FedID 22) has been the U.S. federal government’s primary outreach and collaboration-building event with the worldwide identity community since 1995. FedID provides an immersive environment where identity professionals from the federal government, private sector and academia can dedicate three days to strategic planning, information sharing, needs a...
September 6-9, 2022
Organizer:
AFCEA Location:
Atlanta, GA
Critical Infrastructure Cyber Security Summit
The inaugural Critical Infrastructure Cyber Security Summit is a one-of-a-kind conference designed for exclusively invited Executives in charge of the protection of our Nation’s critical infrastructure & data. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emergi...
Des Moines CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
September 8, 2022
Organizer:
FutureCon Location:
Des Moines, IA
When All Fails: How To Be Cyber Resilient
There is a focus on ensuring an agency’s cybersecurity is as up to date as possible. But, what does one do when all systems put in place to assist in threat attacks break down? Given the high stakes in today’s cyber threat landscape, a good cyber strategy must be based on the assumption that, sooner or later, the agency’s defenses will fail. This assumption places the agency’s one step ahead of the attack: knowing that...
September 8, 2022
Organizer:
ATARC Location:
Webcast
Cybersecurity 2022: Protecting Sensitiv...
During this initial class in the series, we will discuss and provide important guidance for government contractors seeking to ensure compliance with the government’s rapidly expanding cybersecurity requirements. Contractors will learn about new developments under the Biden Administration’s Cybersecurity Executive Order as well as existing statutory and regulatory requirements applicable to contractors. Discussion will cover key age...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.