Back to Search Begin New Search Save Search Auto-Notify
Dedicating Cybersecurity Resources to C...
Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning earlier this year that a Chinese state-sponsored hacking group already has footholds in multiple networks operated by...
August 21, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
Community Forum: Earned Value Managemen...
Earned Value Management (EVM) is a project management technique used to assess and monitor a project’s performance and progress in terms of scope, time, and cost. It integrates project scope, schedule, and cost variables to comprehensively view project performance and progress.Importance of Earned Value Management:Comprehensive Performance MeasurementPredictive AnalysisEnhanced Decision-MakingImproved CommunicationRisk ManagementAccounta...
August 21, 2024
Organizer: Harrisburg University of Science and Technology
Location: Webcast
Add Favorite
Accelerating AI Adoption with Trusted Data
As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge, especially with the growing use of AI-based analytics. Over 80% of government employees use AI regularly, expanding the expectations and complexities in trusted data management. While it can provide the rich insights needed to solve problems, extracting necessary actionable data in context often pr...
August 20, 2024
Organizer: FedInsider
Location: Webcast
Add Favorite
VETS 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWAC. Participants wi...
August 20, 2024
Organizer: General Services Administration (GSA)
Location: Webcast
Add Favorite
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information s...
August 19, 2024
Organizer: Corporate Compliance Seminars
Location: Webcast
Add Favorite
SANS Chicago 2024
Hands-On Cyber Security Training in Chicago Celebrating 35 Years of Cybersecurity Excellence Dive into an immersive cyber security training experience at SANS Chicago 2024 (August 12-17, CT). Led by world-renowned instructors boasting extensive industry experience, SANS Chicago 2024 offers live access to top experts in the field. SANS Chicago 2024 is equipped with industry-leading hands-on labs, simulations, and exercises that you can immediat...
August 12-17, 2024
Organizer: SANS Institute
Location: Chicago, IL
Add Favorite
Federal Health Summit
Health services are an essential mission for the Department of Veterans Affairs, Department of Health and Human Services, the Defense Health Agency and many other federal organizations. The program needs and spending to support them are massive – DHA alone had more than $17 billion in contract awards last year – but the complexity and unique demands of the federal health sector make this an especially challenging market. Washington...
August 16, 2024
Organizer: GovExec
Location: Reston, VA
Add Favorite
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
August 12-16, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
August 12-16, 2024
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
Salt Lake City Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
August 15, 2024
Organizer: FutureCon
Location: Salt Lake City, UT
Add Favorite
Back to Search Begin New Search