CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Cyber Security Training at SANS Nashvil...
Unlock the full potential of your cybersecurity career at SANS Nashville Winter 2025 (January 13-18, CT), a SANS flagship event. Guided by world-renowned instructors at the forefront of the field, this event provides exclusive access to live industry experts, ensuring you stay ahead of the curve. Immerse yourself in a learning environment that features industry-leading hands-on labs, simulations, and exercises, all geared towards practical app...
AI and Analytics: Answering Healthcare'...
Unlock the power of advanced analytics with IPC Global and Qlik by joining our upcoming Healthcare Webinar Series. This carefully curated set of sessions focuses on key areas transforming your healthcare systems, from healthcare research and population health to grants management, supply chain optimization, and AI-powered operations. Whether you're looking to enhance decision-making, streamline operational processes, or modernize your work...
Easy and Quick Determination of the PMF...
Join us on Tuesday, January 14 from 12:00 PM - 2:00 PM Eastern for Easy and Quick Determination of the PMF from the PMP Using Free Tools. This webinar will provide training on using the PMP to generate the PMF, including a walk-through of the rapidly evolving US Army Corps of Engineers HEC-HMS and HEC-RAS modeling processes to transform rain into runoff. The methodology was updated in 2023-2024 based on major software improvements and is cutti...
Science of Visual Analytics
Join us, as we uncover the science behind the art of data visualization. When building visualizations, it is easy to default to familiar chart types. Forget about your excel tables, bar charts, and pie graphs! By focusing on design, visual elements, color, and intentional insight creation, you can elevate your data storytelling. During this webinar, attendees will learn:The science of data visualizationThe methodology behind presenting metrics...
Are SLED Organizations Ready for Zero T...
Join Hypori, and Scoop Cyber for a live, in-person roundtable webcasted for remote attendees, where industry experts will share how SLED organizations are overcoming these challenges with a zero trust mobility strategy. This interactive session will explore practical solutions for:Ensuring Criminal Justice Information Services (CJIS) compliance and preserving the chain of evidenceMeeting Cybersecurity Maturity Model Certification (CMMC) requir...
Value Streams in Action: A Possible Imp...
In our previous webinar with Adaptivist, we explored how process inefficiencies and communication barriers can hinder effective public service. To overcome these challenges, we introduced the concept of Value Streams. Now, let's turn theory into action. Join us for a hands-on demo on January 14th to see how Value Streams can be implemented using the powerful Atlassian ecosystem. In this session, you'll learn how to visualize your entire value...
Washington DC SASE Summit - A Federal E...
Networking, Security, and Zero Trust: A Federal Evolution Join us for a one-day event where we’ll explore the advantages of a unified network and security-as-a-service platform. Discover how to kickstart or elevate your agency’s journey toward meeting the unique demands of SASE and Zero Trust frameworks tailored for government needs. Gain insights into the power of Netskope One and learn how government agencies can unlock seamless...
January 15, 2025
Organizer:
Netskope Location:
Washington, DC
A Deep Dive into Kentucky's Data Securi...
Want to learn the secret to proactive threat detection and response? Before using Elastic, the Commonwealth of Kentucky faced significant cybersecurity challenges, including limited visibility into its IT environment, inefficient incident response processes and data silos that hindered effective analysis. By addressing these pain points through the adoption of Elastic, Kentucky was able to significantly improve its security posture and protect...
Mastering Automation with Okta Workflow...
Take your identity automation to the next level! Join Okta on January 15th to explore how Workflows can revolutionize the way you manage identity processes—no coding required.In this interactive session, you'll:Get a comprehensive overview of Okta WorkflowsDiscover real-world use cases to inspire your automation journeySee a live demo of Workflows in actionWhy Attend?Okta Workflows empowers you to automate even the most complex identity...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.