Implementing Zero Trust Controls and Mo...
Cybersecurity compliance frameworks are curated with the most effective methodologies an organization can take to prevent cyberattacks and reduce the impact if one occurs. If passed in current form, NIST 800-171A Rev.3 final public draft will adopt substantial changes to existing compliance controls required by the Cybersecurity Maturity Model Certification (CMMC). All those within the Defense Industrial Base will be required to observe subst...
Phishing-Resistant Solutions: Modern Au...
As the deadline to implement phishing-resistant multi-factor authentication (MFA) nears for federal agencies, federal identity, credential, and access management stacks need to consider all organizations that do business with the Federal Government. Vendors and System Integrators must adopt phishing-resistant MFA solutions to meet the requirements being implemented by federal agencies by the end of FY2024. UberEther and Nok Nok have invited Yu...
Embracing A Data-Driven Approach To Cyb...
Understanding what devices exist in your environment is the foundation to security. Identify compliance gaps and risks for all IP connected assets regardless of if they are managed or unmanaged. Where are you today with your Asset Management mission? Allow Armis to provide you real-time visibility and control over every asset connected to your network. Reserve a spot and earn up to 3 Continuing Professional Education (CPE) credits by taking th...
Unlocking the Potential of Proofpoint S...
The public sector is under constant threat from cyber criminals who employ advanced tactics such as phishing, ransomware, imposter emails, and other methods to exploit employee vulnerabilities. Human error is typically the starting point of most attacks, and cyber criminals have become adept at using social engineering techniques to target individuals with personalized messages designed to be highly persuasive. With people acting as the most c...
Implementing AI Provides Short & Long-T...
Government today faces a long list of imperatives in serving and defending its constituents while supporting and empowering its workforce. Constituents must trust that their need for essential services can be met with transparency, without sacrificing their privacy and security. Agencies and customers alike must feel safe from internal and external threats, including cyberattacks that could cripple infrastructure and disrupt vital services. Em...
June 7, 2024
Organizer:
FedInsider Location:
Webcast
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then moves i...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Construction Quality Control / Informat...
Join us on June 11, from 12:00 PM - 2:00 PM Eastern for Construction Quality Control / Information Data Systems for Dam Rehabilitation. We live in an information age. A huge variety of digital tools and methods are in use to assure quality in dam construction. These tools can be leveraged to verify compliance with specifications, excavation limits, production rates, construction limits, structure size, geotechnical instrumentation trends, and...
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
Tableau Server to Cloud: Lift & Shift v...
Is your on-premise Tableau Server hindering your data analysis capabilities? Tableau cloud beckons with faster analytics, scalability, security and simplified management, but migrating your entire Tableau environment can feel daunting. This upcoming webinar cuts through the confusion, unpacking the two main migration approaches viz: Lift & Shift and Tool-based migration. Come join Joseph Bernardo, Vice President of Data Value at USEReady,...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.