4th Annual C5 Cyber & IT Forum Hawaii
What CFH Is All About The 4th Annual C5 Cyber & IT Forum Hawaii (CFH) will take place at Fort Shafter on Wednesday 16 APR and Thursday 17 APR 2025. This two-day event will focus on providing the latest cybersecurity, command, control, communications, computers, and cyber-defense updates and strategies for cyber and IT professionals on Oahu. There is no fee to attend for all those with a .mil, .gov, or .edu email address and you may attend...
CGRC | Official ISC2 Training Week
CGRC | Official ISC2 Training Week 40 CPE’s Official ISC2 CGRC certification provides a comprehensive review of the knowledge required to effectively gain the expert knowledge, skills, and experience to manage risk and authorize and maintain information systems within various frameworks. Participants receive the following with registration: Official ISC2 CGRC Student Training Guide (eBook) 180-Day Access to Class Recordings Applied Scena...
Zero Trust Implementations Lessons Learned
The “Zero Trust Implementation Lessons Learned” virtual workshop will delve into the critical lessons and best practices derived from real-world Zero Trust security implementations within government agencies. As cyber threats continue to evolve, the need for a robust and adaptable security framework becomes paramount. Our subject matter experts will share their experiences, challenges, and successes in adopting Zero Trust principle...
SANS Cybersecurity Leadership Summit 2025
Learn, share, and engage with fellow cybersecurity leaders.In a rapidly evolving threat landscape, leaders can’t just keep up—they must set the standard. The SANS Cybersecurity Leadership Summit is for industry leading CISOs, directors and managers looking to empower themselves with the knowledge and tools to not just participate, but to set the pace in cybersecurity leadership. This Summit provides invaluable insights from industr...
RSA Conference 2025
At RSAC 2025, you're not just attending a conference—you're stepping into a vibrant, thriving community of thinkers, innovators, and achievers. Though we come from different corners of the cybersecurity world, we are united by a common mission: to foresee risks, counter threats, and embrace the challenges ahead. Together, we shape the future of security. Together, we shine as one. Join us to be a part of something bigger. Many Voices. On...
April 28 - May 1, 2025
Organizer:
RSA Location:
San Francisco, CA
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Managing Data & Data Security Best Practices
The “Data Management & Data Security Best Practices” virtual workshop will dive into the critical domain of public sector data management and data security. This session aims to equip government officials and IT professionals with essential knowledge and strategies to efficiently handle and protect vast amounts of sensitive information. Our subject matter experts will share practical insights on developing comprehensive data ma...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then move...
The South Fork Dam Breach and Johnstown...
Join us on Tuesday, May 13 from 12:00 PM - 2:00 PM Eastern for The South Fork Dam Breach and Johnstown Flood of 1889: A Civil and Dam Engineering History of the USA’s Deadliest Dam Failure. The 1889 breach of the South Fork Dam, which caused the infamous “Johnstown Flood,” remains the deadliest dam failure in US history. The Commonwealth of Pennsylvania built the dam in the mid-1800s as part of a cross-state transportation ne...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.