Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive p...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Security and Privacy Controls (NIST SP...
Are you looking to enhance your knowledge of security and privacy controls? Join our upcoming 4 CPE event focused on Security and Privacy Controls based on NIST SP 800-53 Revision 2 (R2). This event will provide you with valuable insights into the recommended security controls for federal information systems. NIST Special Publication (SP) 800-53 Revision 2 offers specific guidance on the application of security controls to Industrial Control...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Value Streams in Action: A Possible Imp...
In our previous webinar with Adaptivist, we explored how process inefficiencies and communication barriers can hinder effective public service. To overcome these challenges, we introduced the concept of Value Streams. Now, let's turn theory into action. Join us for a hands-on demo on January 14th to see how Value Streams can be implemented using the powerful Atlassian ecosystem. In this session, you'll learn how to visualize your entire value...
A Deep Dive into Kentucky's Data Securi...
Want to learn the secret to proactive threat detection and response? Before using Elastic, the Commonwealth of Kentucky faced significant cybersecurity challenges, including limited visibility into its IT environment, inefficient incident response processes and data silos that hindered effective analysis. By addressing these pain points through the adoption of Elastic, Kentucky was able to significantly improve its security posture and protect...
Boost Your Revenue and Productivity wit...
We’re excited to invite you to an engaging session all about Power PDF, the leading solution for your PDF needs. Join us to explore how Power PDF is revolutionizing document management for organizations like yours. During this webinar, attendees will : Uncover the Evolution of Power PDF: Gain insight into its history and how satisfied customers are using it today.Experience the Advantages: Learn why customers and analysts love Power PDF,...
IPv6 Workshop Series: Achieving IPv6-On...
In this workshop session, the final of our three-part IPv6 series, HexaBuild’s Scott Hogg will provide an overview on how DNS64 and NAT64 can be used to facilitate IPv6-only end-nodes reaching IPv4-only services. Along with Infoblox’s Cricket Liu, they will review the architectural considerations for this solution and how to configure the DNS64 functionality in Infoblox. Key Learning Objectives:Discuss how the DNS64 address synthes...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.