San Diego Cyber Security Summit
The Second Annual San Diego Cyber Security Summit returns on March 31, In-Person at The Westin San Diego Gaslamp Quarter and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Disc...
2022 Hybrid Cloud Virtual Summit
Over the past two years, the Federal workforce has made the shift to a hybrid work environment, as a result the security and identity management within the Federal Cloud space has had to strengthen. Tune into this session to hear from Federal Leaders on the unique challenges of managing these identities across hybrid cloud environments. What are the fundamental capabilities needed for management of millions of identities within this hybrid clo...
March 31, 2022
Organizer:
ATARC Location:
Webcast
Fireside Chat with Chris Alvares CDO, U...
Our organizations and agencies work in a wide-ranging ecosystem involving multiple missions, locations, systems, and data sources. Orchestrating a robust security program, or executing a critical mission requires leaders to consider multiple sources of data at a near-real-time pace, resulting in potential information overload or risking mission failures. Implementing analytic automation to analyze and synthesize information enables leaders to...
Effective Market Research using Market...
Target Audience: Federal Agency and Military In this course, you will learn why market research is conducted, when and how to conduct market research; the regulatory nature of FAR Part 10 and how it ties into other decisions such as acquisition planning (Part 7) small business set-asides, commercial items, contract type selection and more, and how to get better results by making your data collection methods easier. The course will use real lif...
SouthEast Virtual Cybersecurity Summit
While the needs of the cybersecurity community often cross international borders, sometimes the most important way to stay on top of the latest trends is to focus on what’s happening locally. Join the Southeast Virtual Cybersecurity Summit to connect with like-minded executives, innovative solutions providers, experts and luminaries.Log in to the immersive virtual platform and attend a variety of educational sessions led by subject matte...
FUN with the FAR℠ Season 9
26 Bi-Weekly* Sessions from January 5, 2022 to December 14, 2022 Covering each Part of the Federal Acquisition Regulation and created to make the FAR approachable and thought provoking for contracting professionals at all levels. This training is delivered in an innovative talk-show format with PCI’s most gregarious instructor Steve Daoust as your host and a different subject matter expert each session. The Federal Acquisition Regulation...
Harmonize Cybersecurity and the User Ex...
Learn from staff at the Defense Information Systems Agency (DISA) who will discuss the key programs to provide for a secure cyber environment for the nation s warfighters. DISA is exploring ways to operate in a secure information environment while creating an optimal user experience. As the lead IT service provider for the Defense Department, the users experience is of the utmost importance.
Climate Changes the Landscape for Elect...
Here in the United States, one of the most visible actions taken to address climate change is the federal government’s focus on zero-emission vehicles and the supporting infrastructure. This is an area where the government plans to lead by example. Listen as experts from both the public and private sectors discuss the concept of Future Histories, Laws of Zero in planning for an electric vehicle future. Topics covered include: electrifyin...
March 30, 2022
Organizer:
FEDINSIDER Location:
Webcast
Jumpstart CMMC 2.0 FCI & CUI Protection
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But, for many agencies and DIBs, it's a challenge to implement required information security controls to data in their...
Druva Helps Make ROBO Employee Data Sec...
With the increase in work from home and hybrid work environments, dependency on legacy infrastructure leaves IT teams and employees exposed. Organizations are finding themselves vulnerable, struggling to reduce risk, and recovering after cyberattacks. During this webinar, attendees will learn to: Protect assets from Ransomware and Cyber threats Provide the most stringent security and privacy standards Protect and Govern Endpoints and Cloud App...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.