Exploited Vulnerabilities, the Threat A...
In this webinar, Patrick Garrity, Security Researcher at VulnCheck, will dive into exploited vulnerabilities, exploring which technologies are impacted, which threat actors are most active, and how quickly vulnerabilities are being exploited once disclosed. Understanding these dynamics is key to staying ahead of emerging threats and protecting your mission. Join VulnCheck on December 4th to discover:The most commonly exploited vulnerabilities...
Virtual Summit: IoT & OT Security Summit
ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges. Highlight TopicsThe Art and Science of Translating Cyber Risk and Loss Exposure Into Quantifiab...
Breakfast Buzz: Elevating User Experien...
As geopolitical and global threats continue to evolve, the DOD's employees and warfighters demand IT and digital solutions that are performant, adaptable, and aligned towards mission success. The symbiotic nature of end users, technology, and mission parameters demands data-driven decision making when it comes to IT service delivery. During this breakfast event, join Riverbed and incredible DOD leaders as we highlight how key digital tools and...
December 5, 2024
Organizer:
GovExec Location:
Arlington, VA
AI and Analytics: Answering Healthcare'...
Unlock the power of advanced analytics with IPC Global and Qlik by joining our upcoming Healthcare Webinar Series. This carefully curated set of sessions focuses on key areas transforming your healthcare systems, from healthcare research and population health to grants management, supply chain optimization, and AI-powered operations. Whether you're looking to enhance decision-making, streamline operational processes, or modernize your work...
FAS and Buy.GSA.Gov Overview
GSA Events offers a wide variety of training opportunities for your agency. The training is free, and you can earn Continuous Learning Points (CLPs) for attending all classes. With these recurring training opportunities, GSA provides overviews of acquisition support that is available to our federal customers and Military! All developed to make your acquisition work easier and more efficient while achieving cost savings! Mark your calendar righ...
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way. Join CyberArk and Optiv + ClearShark's leaders on December 5th as they share insights and "confessions" into implementing Zero Trust security principles, emphasizing that it...
Cloud Governance, Risk and Compliance T...
Cloud GRC Training In today’s rapidly evolving digital landscape, managing governance, risk, and compliance (GRC) in the cloud is more critical than ever. Intrinsec’s 2 day Cloud GRC Training Course is designed to equip IT professionals, security specialists, and compliance officers with the knowledge and skills needed to navigate the complexities of cloud governance and compliance frameworks effectively. Created in response to fee...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (...
Probable Maximum Precipitation: What Is...
Join us on December 10, 2024, from 12:00 PM - 2:00 PM Eastern for Probable Maximum Precipitation: What Is It, How Is It Calculated, and How Do I Apply It? This webinar will provide detailed discussions related to the development of Probable Maximum Precipitation and its application for dam safety. Detailed information will be provided regarding the history of PMP development and its use in dam safety design, the current standard of practice fo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.