Dedicating Cybersecurity Resources to C...
Power grids, water systems, transportation networks and other vital services are essential to communities but lack substantial cyber defenses. Their vulnerabilities make them tempting targets, whether for nation-states or cybercriminals. For instance, the Cybersecurity and Infrastructure Security Agency (CISA) issued a warning earlier this year that a Chinese state-sponsored hacking group already has footholds in multiple networks operated by...
August 21, 2024
Organizer:
FedInsider Location:
Webcast
Community Forum: Earned Value Managemen...
Earned Value Management (EVM) is a project management technique used to assess and monitor a project’s performance and progress in terms of scope, time, and cost. It integrates project scope, schedule, and cost variables to comprehensively view project performance and progress.Importance of Earned Value Management:Comprehensive Performance MeasurementPredictive AnalysisEnhanced Decision-MakingImproved CommunicationRisk ManagementAccounta...
Accelerating AI Adoption with Trusted Data
As agencies face unprecedented data volumes and velocity, managing the speed and size of the data flow efficiently becomes a significant challenge, especially with the growing use of AI-based analytics. Over 80% of government employees use AI regularly, expanding the expectations and complexities in trusted data management. While it can provide the rich insights needed to solve problems, extracting necessary actionable data in context often pr...
August 20, 2024
Organizer:
FedInsider Location:
Webcast
VETS 2 DPA Training
All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWAC. Participants wi...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information s...
SANS Chicago 2024
Hands-On Cyber Security Training in Chicago Celebrating 35 Years of Cybersecurity Excellence Dive into an immersive cyber security training experience at SANS Chicago 2024 (August 12-17, CT). Led by world-renowned instructors boasting extensive industry experience, SANS Chicago 2024 offers live access to top experts in the field. SANS Chicago 2024 is equipped with industry-leading hands-on labs, simulations, and exercises that you can immediat...
Federal Health Summit
Health services are an essential mission for the Department of Veterans Affairs, Department of Health and Human Services, the Defense Health Agency and many other federal organizations. The program needs and spending to support them are massive – DHA alone had more than $17 billion in contract awards last year – but the complexity and unique demands of the federal health sector make this an especially challenging market. Washington...
August 16, 2024
Organizer:
GovExec Location:
Reston, VA
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Salt Lake City Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
August 15, 2024
Organizer:
FutureCon Location:
Salt Lake City, UT
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.