OASIS+ DPA Training
OASIS+ Delegation of Procurement Authority (DPA) Training gives procurement staff access to the new OASIS+ contracts and teaches best practices for task order issuance. The DPA clearly delineates the roles and responsibilities between the GSA contracting officer and the ordering contracting officer and complies with the Office of Management and Budget's executive agent designation to GSA. Warranted OCOs (a contracting officer appointed pursuan...
CyberThreats 2024: Combatting the Evolv...
The means and methods of launching cyber attacks against government agencies and critical infrastructure industries at all levels continue to proliferate rapidly. From cyber attacks on water and wastewater treatment systems to ransomware targeting hospitals and physicians’ practices, phishing attacks to straightforward fraud, state and local agencies, educational institutions, and tribal and territorial governments often find themselves...
December 19, 2024
Organizer:
FedInsider Location:
Webcast
Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Empowering Decision-Makers: Tableau Age...
Join us, to learn how you can empower Analysts and Executives to use the power of Tableau Agent to be able to go above and beyond the pre-built dashboards and answer the questions you have from your data. During this webinar, attendees will:Quickly comprehend data at the speed of thoughtUnderstand when to use Tableau Pulse versus Tableau AgentEvolve their consumption of data using a blend of Pull and Push-based analytics
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then move...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.