Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Value Streams in Action: A Possible Imp...
In our previous webinar with Adaptivist, we explored how process inefficiencies and communication barriers can hinder effective public service. To overcome these challenges, we introduced the concept of Value Streams. Now, let's turn theory into action. Join us for a hands-on demo on January 14th to see how Value Streams can be implemented using the powerful Atlassian ecosystem. In this session, you'll learn how to visualize your entire value...
A Deep Dive into Kentucky's Data Securi...
Want to learn the secret to proactive threat detection and response? Before using Elastic, the Commonwealth of Kentucky faced significant cybersecurity challenges, including limited visibility into its IT environment, inefficient incident response processes and data silos that hindered effective analysis. By addressing these pain points through the adoption of Elastic, Kentucky was able to significantly improve its security posture and protect...
Boost Your Revenue and Productivity wit...
We’re excited to invite you to an engaging session all about Power PDF, the leading solution for your PDF needs. Join us to explore how Power PDF is revolutionizing document management for organizations like yours. During this webinar, attendees will : Uncover the Evolution of Power PDF: Gain insight into its history and how satisfied customers are using it today.Experience the Advantages: Learn why customers and analysts love Power PDF,...
IPv6 Workshop Series: Achieving IPv6-On...
In this workshop session, the final of our three-part IPv6 series, HexaBuild’s Scott Hogg will provide an overview on how DNS64 and NAT64 can be used to facilitate IPv6-only end-nodes reaching IPv4-only services. Along with Infoblox’s Cricket Liu, they will review the architectural considerations for this solution and how to configure the DNS64 functionality in Infoblox. Key Learning Objectives:Discuss how the DNS64 address synthes...
Black Duck Takes Flight
Exciting news! Synopsys Software Integrity Group has taken flight as a new, independent company: Black Duck Software, Inc. Join us on January 22nd for a live discussion on how Black Duck can empower your public sector organization to: What’s new for the public sector at Black Duck How Black Duck's portfolio supports a risk-based approach to security Tactics to minimize costs across the software development life cycle
F5 Lab Day API Security: Capture the Flag
Are you ready to roll up your sleeves, crack a Red Bull, and see if you have what it takes to Capture the Flag? Join the F5 DISA team for an interactive Capture the Flag competition where you will compete against others to hunt for API vulnerabilities and learn how they work. See who has what it takes to identify vulnerable APIs and ultimately Capture the Flag! In this lab and Capture the Flag exercise, you will learn how to identify and mitig...
Chicago Cybersecurity Conference
Join Us in Chicago for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing our...
January 23, 2025
Organizer:
FutureCon Location:
Oak Brook, IL
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.