How EDD's Cybersecurity Division Evolve...
Is your public sector organization struggling to combat cyber attacks? Join Elastic and California EDD to learn how Elastic provided the EDD with real-time visibility into their systems, enabling them to detect and prevent cybersecurity risks early on. During this session, Elastic & California EDD experts will discuss:California's enhanced ability to identify suspicious patterns and anomalies in their dataCalifornia's improved investigatio...
Building Resilience to Counter Cyber Th...
Security threats are more dynamic and sophisticated than ever, and static and siloed solutions are simply not enough to keep businesses protected. Cyber threat intelligence is vital for understanding, identifying and staying ahead of risks; yet many organizations struggle to operationalize tactical threat intelligence effectively. With decades of operational threat intelligence experience, Trellix has a proven track record helping organization...
Okta Identity Process Automation
Join us on November 21st for networking and insights from Okta experts on how to do more with less by automating your identity processes using Okta Identity Governance and Okta Workflows. Our Okta experts will shed light on strategies to enhance user experiences for both internal and external customers. The knowledge shared will empower you to streamline processes, bolster security, and foster seamless collaboration in your organization. Durin...
Government Contracting Under the FAR ...
Every year, firms are held liable for overhead rate errors. And it’s no wonder Federal Acquisition Regulation (FAR) overhead rates are notoriously complex and loaded with tricky nuances. Correctly interpreting and applying the FAR requirements is critically important. This year’s training sessions are updated to include the latest court cases on timekeeping and mergers and acquisitions. Additional discussion includes the 2024 Natio...
ATRW Uncover the Real CORs of the Feder...
Join us for a valuable panel discussion where Contracting Officer Representatives (CORs) share their real-world experiences in federal acquisition. Gain practical insights and learn effective tips and tricks to streamline and simplify COR responsibilities.
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
CMMC Level 3 Implementation
This CMMC training event is designed to equip participants with the knowledge and skills necessary to effectively implement the Level 3 practices outlined in 48 CFR 52.204-21. These practices establish a crucial security foundation for organizations aiming to achieve higher levels within the Cybersecurity Maturity Model Certification (CMMC). Key Points: CMMC Levels: The CMMC model will encompass five maturity levels, with Level 3 being an adv...
Protecting Controlled Unclassified Info...
This 2 CPE training event "Protecting Controlled Unclassified Information" is based on NIST SP 800-171 R3." In this webinar, we will overview the essential strategies and guidelines outlined in NIST SP 800-171 Revision 3 (R3) to safeguard Controlled Unclassified Information (CUI). Our CPE training is designed to equip participants with the knowledge and tools needed to protect sensitive information from unauthorized access, disclosure, or los...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then move...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.