Minneapolis Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
May 2, 2024
Organizer:
FutureCon Location:
Minneapolis, MN
AI for Government Summit: Taking the Le...
No matter how quickly technology has changed over the past few decades, nothing matches the speed with which AI has begun to transform how agencies operate. In response to the changing landscape, in October 2023, the Biden administration released two frameworks, the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence and the Office of Science and Technology Policy’s Blueprint for an AI Bill...
May 2, 2024
Organizer:
FedInsider Location:
Reston, VA
Advanced Threat Protection for Governme...
In today’s hyperconnected world, where cyber threats evolve rapidly and cyber criminals operate with heightened speed and flexibility, staying ahead of these risks is paramount. Your security teams need to be equally agile and well-prepared. Join ATARC alongside government and industry experts for a comprehensive discussion on the latest threat vectors impacting agency infrastructures. Discover insights into how cloud-native security sol...
May 2, 2024
Organizer:
ATARC Location:
Webcast
Taming the Data Dragon: Exploring the C...
With the continued rise of public records requests, data volumes have turned into a beast. Government agencies are facing a series of battles when it comes to FOIA requests, regulatory compliance, investigations, data deletion policies, and strict deadlines. To have a fighting chance, teams will need to know where data lives, who has access to it, and which regulations it is subject to in order to ensure successful e-discovery, privacy, and co...
Splunk Enterprise Security Virtual Workshop
Join us for a virtual workshop where users will have the opportunity to walk through multiple real-world scenarios and see first-hand how Enterprise Security can be used from the creation of a notable event to investigate to the raw event that identifies the adversary's action. The workshop leverages the popular Boss of the SOC (BOTS) dataset and is laid out in an interactive format. Users will leave with a better understanding of how Splunk a...
The Future of Connectivity
Are you maximizing the impact of 5G at your agency? Join moderator Jason Miller, and federal agency and industry leaders as they discuss network modernization strategy, 5G, AI and plans for the future at the Naval Network Warfare Command and NASA. Learning objectives: Current network modernization strategies in agencies The roles of private networks and 5G The future of mobility
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Exploring Five Emerging Cybersecurity D...
In the world of cybersecurity defenses, the only constant is change. More than 3,500 cybersecurity vendors are continuously innovating, finding new ways to mitigate risks and secure modern computing environments. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he reviews five emerging cybersecurity defenses, including: SaaS security posture management (SSPM) Cloud-native application protection platform (CNAPP) Cloud infr...
May 1, 2024
Organizer:
ISC2 Location:
Webcast
Using the Tools at Hand to Get to Zero Trust
Federal agencies have been ordered to move toward zero trust architectures with alacrity, through Executive Order 14028 on improving cybersecurity and the Office of Management and Budget’s two memoranda, M-22-09 on meeting zero trust cybersecurity principles, and M-21-31 on improving investigative and remediation capabilities following cyber breaches. The Department of Homeland Security observed in its Zero Trust Implementation Strategy...
May 1, 2024
Organizer:
Fedinsider Location:
Webcast
Alliant 2 DPA Training
Who Should Attend: All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how Alliant 2 can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against Alliant 2. This web...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.