Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have needed to embrace a new way of doing business, with emerging technologies like AI and Machine Learning accelerating approval. Join Yext for a complimentary webinar to learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How technology innovation...
Zero Trust Is Not One Size Fits All: Wh...
Join experts from Appgate, Tenable, and Carahsoft as we discuss why the government and industry need to implement a dynamic Zero Trust strategy, and strategies to facilitate securing these platforms and data. In this webinar, you will learn about: How Zero Trust fits into IT, OT, and IoT Common use cases for integrating Zero Trust into IT/OT/IoT security Benefits organizations can expect from implementing a comprehensive Zero Trust strategy ac...
Lessons States Learned from COVID-19: A...
How are states leveraging technology to adopt the new COVID era? State and Federal governments have had to think fast to embrace to a new way of doing business. Emerging technologies like AI and Machine Learning have helped accelerate approval. Join Yext for a complimentary webinar and learn how state leaders are turning the pandemic into a promising future filled with innovation and creativity. Specifically, this discussion will cover: How te...
SouthEast Virtual Cybersecurity Summit
While the needs of the cybersecurity community often cross international borders, sometimes the most important way to stay on top of the latest trends is to focus on what’s happening locally. Join the Southeast Virtual Cybersecurity Summit to connect with like-minded executives, innovative solutions providers, experts and luminaries.Log in to the immersive virtual platform and attend a variety of educational sessions led by subject matte...
FUN with the FAR℠ Season 9
26 Bi-Weekly* Sessions from January 5, 2022 to December 14, 2022 Covering each Part of the Federal Acquisition Regulation and created to make the FAR approachable and thought provoking for contracting professionals at all levels. This training is delivered in an innovative talk-show format with PCI’s most gregarious instructor Steve Daoust as your host and a different subject matter expert each session. The Federal Acquisition Regulation...
Harmonize Cybersecurity and the User Ex...
Learn from staff at the Defense Information Systems Agency (DISA) who will discuss the key programs to provide for a secure cyber environment for the nation s warfighters. DISA is exploring ways to operate in a secure information environment while creating an optimal user experience. As the lead IT service provider for the Defense Department, the users experience is of the utmost importance.
Climate Changes the Landscape for Elect...
Here in the United States, one of the most visible actions taken to address climate change is the federal government’s focus on zero-emission vehicles and the supporting infrastructure. This is an area where the government plans to lead by example. Listen as experts from both the public and private sectors discuss the concept of Future Histories, Laws of Zero in planning for an electric vehicle future. Topics covered include: electrifyin...
March 30, 2022
Organizer:
FEDINSIDER Location:
Webcast
Jumpstart CMMC 2.0 FCI & CUI Protection
Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). But, for many agencies and DIBs, it's a challenge to implement required information security controls to data in their...
Druva Helps Make ROBO Employee Data Sec...
With the increase in work from home and hybrid work environments, dependency on legacy infrastructure leaves IT teams and employees exposed. Organizations are finding themselves vulnerable, struggling to reduce risk, and recovering after cyberattacks. During this webinar, attendees will learn to: Protect assets from Ransomware and Cyber threats Provide the most stringent security and privacy standards Protect and Govern Endpoints and Cloud App...
The GAO Green Book Compliance Academy (...
A Practical Approach to Internal Controls under the GAO Green Book. Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013) from the Committee of Sponsoring Organizations of the Treadway Commission (COSO). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the G...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.