HEC-RAS 2D
This is an interactive seminar focused on the practical use and advantages of two-dimensional flow capabilities in HEC-RAS, with emphasis on applications for the dam safety industry. The course will maintain a balance between lecture-style presentations on model theory and hands-on workshop sessions for practical examples. Topics will include applications and benefits of HEC-RAS 2D modeling; RAS Mapper and terrain preparation; executing 2D mod...
Charlotte Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
Save the Date: September 4, 2025
Organizer:
FutureCon Location:
Charlotte, NC
SANS 2025 AI Survey Webcast & Forum: Me...
Generative AI (GenAI) and large language models (LLM) entered the cybersecurity zeitgeist nearly three years ago, when ChatGPT became available to the public. The industry immediately saw its potential and scrambled to incorporate it in any way that made sense (and many ways that did not make sense). How have our expectations stacked up against reality? What security problems has GenAI made more manageable, if any? The 2025 SANS AI Survey trie...
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
Getting Ahead of the Storm: Building Ca...
Join us on Tuesday, September 9 from 12:00 PM - 2:00 PM Eastern for Getting Ahead of the Storm: Building Capacity to Respond to Large-Scale Weather-Related Dam Impacts. This webinar will discuss the lessons and expertise gained from rebuilding a state dam safety program from state dam safety program officials and emergency managers almost 10 years after a historic rainfall event that had impacts statewide and caused the failure of 50 state-reg...
Milwaukee Cybersecurity Confernece
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
“Cybersecurity is no longer just an IT problem”
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
Save the Date: September 11, 2025
Organizer:
FutureCon Location:
Milwaukee, MN
2025 SANS Zero Trust Survey Webcast ...
As digital transformation accelerates, Zero Trust has become crucial for defending against an increasingly complex threat landscape. The rise in ransomware, credential stealers, supply chain attacks, and disruptive incidents impacting availability in 2024 has underscored the need for resilient cybersecurity strategies that can withstand and adapt to evolving threats. Our 2025 survey focuses on how Zero Trust principles, such as identity manage...
Improving Public Sector Customer and Em...
The annual “Public Sector Digitization Best Practices” virtual workshop will focus on the essential aspects of managing electronic records in the digital age. Designed specifically for government professionals, this program will provide a comprehensive overview of the regulations and best practices for digitizing federal records in accordance with the Code of Federal Regulations. Attendees will learn and hear about the key standard...
Certificate of Cloud Security Knowledge...
Certificate of Cloud Security Knowledge v5 | Lectures and Labs The CCSK is widely recognized as the standard of expertise for cloud security and provides a cohesive, vendor-neutral understanding of how to secure data in the cloud. The training starts off with a detailed description of cloud computing and business requirements (governance, risk management, compliance, and legal) based on standards such as NIST and ISO/IEC. The session then move...
CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.