Using Security Intelligence to Protect...
In 2023, 725 data breaches were reported to the Department of Health and Human Services, according to HIPAA Journal. More than 133 million records were exposed or impermissibly disclosed. That’s just one risk in healthcare ecosystems. The dangers extend beyond that: every hospital bed is connected to the internet. People die when hospitals lose power – and if a hospital’s IT systems are compromised all the electronic pieces t...
September 12, 2024
Organizer:
FedInsider Location:
Webcast
The GAO Green Book Compliance Academy
A Practical Approach to A-123 Compliance Programs Join us for a unique, interactive workshop that "walks you through" the latest update of The Green Book which now conforms to the Internal Control Integrated Framework (COSO 2013). This training is focused on the current Standards for Internal Control in the Federal Government as detailed in the Green Book. This 18 hour CPE course provides you with the tools to implement a compliance program th...
GSA Facilities Solutions on MAS Training
Join this virtual meeting for an introduction of the GSA's Facilities Maintenance and Management Schedule. In this virtual 1 hour training session you can expect: An introduction of the Facilities Maintenance and Management ScheduleTo have a better understanding of the facilities related solutions that are available on the Multiple Award Schedule (MAS)Ordering options and flexible featuresHelpful tips on how to use the schedule and gain access...
Hydraulic Tour of Standard NRCS Inlet Risers
Join us on September 10, from 12:00 PM - 2:00 PM Eastern for Hydraulic Tour of Standard NRCS Inlet Risers. This webinar will describe USDA-NRCS riser inlets for watershed dams. USDA-ARS research on various riser configurations informed the current standard NRCS riser design. Other NRCS inlet risers exist for specific design situations. Maintenance concerns for continued optimum riser performance will be discussed. Finally, this webinar will ex...
FedTalks 2024
The federal government is in the midst of a digital transformation that has the potential to reinvent the way agencies provide citizen services and perform their most essential functions. Guided by the top priorities of the White House, leaders across the federal government are embracing modern technologies like AI and the cloud, fortifying cybersecurity by shifting to zero-trust architectures and prioritizing user experience in digital servic...
Improving Management of Complex Cloud E...
The compute environment is getting more and more complicated for government agencies. Public cloud and private cloud, on-premises data centers, edge locations, government-owned assets and BYO devices – and now with the integration of AI and advanced cloud services – agencies face the critical task of orchestrating a vast array of data, applications, networks, and systems across increasingly intricate control planes. Blending all th...
September 10, 2024
Organizer:
FedInsider Location:
Webcast
Empowering Talent: U.S. Army's Strategy...
Talent optimization remains a top priority for the U.S. Army and achieving the Army People Strategy requires a robust Talent Management system. Aligning unique Soldier talents with the Army’s organizational talent demands is critical to achieving the Army of 2030 and beyond. Identifying, aligning, and advancing the Soldier Experience, at echelon, necessitates a modernized data platform with world-class talent assessment capabilities. We...
Peak Cyber Symposium
Join us before the Peak Cyber Symposium on Tuesday, September 10th, for an exclusive workshop hosted by Axonius Federal Systems and Palo Alto Networks, where you’ll explore how the combined power of Axonius and Palo Alto Networks XSOAR can transform your cybersecurity operations. This workshop will provide insights into how these two industry-leading solutions work together to enhance your organization’s security posture by streaml...
SBOMs: Your Key to NIST SP 800-218 Compliance
Government agencies face increasing pressure to secure their critical infrastructure from cyber threats. NIST SP 800-218 and the CISA Secure Software Development Attestation Form mandate robust software supply chain security practices. Join our Sonatype expert for this informative webinar where we will explore how understanding Software Bills of Materials (SBOMs) is essential for achieving NIST SP 800-218 compliance. Learn how to:Understand th...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.