Vision 2023: How Digital Transformation...
The state of Texas wants to accelerate the use of next-generation technology to deliver secure digital services. To that end, it has released its 2022-2026 State Strategic Plan for Information Resources Management, which sets four overarching goals: Secure IT service delivery Advanced data management Strategic digital transformation Proactive approach to emerging technologies Just as Texas agencies are looking to modernize and transform their...
December 6, 2022
Organizer:
FEDINSIDER Location:
Austin, TX
Classified Mobility Solutions: Streamli...
Federal defense and civilian organizations responsible for communications acknowledge the critical need to improve mobility and remote work solutions for classified workers. Now, turnkey enterprise-class network solutions combined with industry-leading secure software are delivering the benefits of classified access to warfighters and remote and mobile workers in the field. These systems allow end users to use commercial mobile devices to acce...
FCL-GSA-0023 Basic Contracting for GSA...
Target Audience: Federal Agency and Military This comprehensive training course covers Federal Supply Schedules contracting and ordering procedures. It addresses placing orders against Multiple Award Schedules, as outlined in Federal Acquisition Regulation (FAR) Subpart 8.4. In this course you will learn about the unique flexibility within the GSA Schedules program. This is a four (4) CLP credit course. Note: This webinar satisfies the FAC-C L...
New Year, New Threats: What You Need to...
In this webinar, Joey Fitzpatrick, Lead Threat Analysis at IronNet, will share tips and tools to prevent impacts to mission-critical functions by blocking threats before a cyber-attack. As you prepare for 2023, do you have a comprehensive attack surface management plan to proactively stop cyber threats? Learn best practices to strengthen your cybersecurity posture and how IronNet's elite threat hunters can help you prepare.
Enabling Next Generation Military Techn...
What does the basic set up of ICAM look like in defense agencies and how do they maintain that security and expansion as they move forward? During part 1 of this exclusive webinar series, moderator Tom Temin will discuss ICAM with agency and industry leaders. Stay tuned for parts 2 and 3 of this series where Tom and his guests will discuss mission partner environment networking and 5G. Learning objectives: Current state of ICAM Use of ICAM as...
Effective Use of the COSO Framework (16 CPEs)
4, ba Our approach for this in-person training event is to provide the relevant information which internal control professionals will need to fulfill the "Internal Control Life Cycle" using the "top-down, risk-based" approach. We provide the background knowledge sources, advice on how to conduct risk assessments, discuss scoping, and review how to plan the assessment of an internal control framework based on COSO. Risk management activities ar...
Columbus CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
December 1, 2022
Organizer:
FutureCon Location:
Columbus, OH
INTERFACE Seattle 2022
WELCOME TO INTERFACE Seattle 2022! IT Infrastructure is constantly changing, bringing more new challenges with it every day. From ransomware and the latest security threats to needs for increased bandwidth and storage, it’s nearly impossible to keep up to date. Our conference is designed to help. We’ve assembled a combination of Best-in-Breed hardware and software solutions, along with local experts and organizations, to help educa...
2022 Government Identity Security Virtu...
Traditional security perimeters are disappearing due to the rise of mobility and the cloud. Identity has therefore become the new security control, forcing leaders to focus on protecting identities and their organization from identity compromises. However, executive order deadlines and increasing dependence on remote businesses continue to accelerate the adoption of new approaches to identity and access management (IAM). Now IT leaders face ne...
DoDIIS 2022 Webinar Series: Cross-App S...
In this webinar, attendees will learn how they can: Reduce enterprise-wide access governance costs by standardizing SOD control processes in cross-app business activities Prevent SOD conflicts at the start by ensuring SOD-compliant provisioning across applications Clearly articulate the financial exposure access risks have on the business and actively mitigate them Empower risk owners to make access control decisions based on tangible business...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.