FAS and Buy.GSA.Gov Overview
GSA Events offers a wide variety of training opportunities for your agency. The training is free, and you can earn Continuous Learning Points (CLPs) for attending all classes. With these recurring training opportunities, GSA provides overviews of acquisition support that is available to our federal customers and Military! All developed to make your acquisition work easier and more efficient while achieving cost savings! Mark your calendar righ...
5 Zero Trust Confessions: Fireside Chat...
There is no one Zero Trust technology. Effective Zero Trust strategies utilize a mix of existing technologies and approaches, and it does not happen overnight – it is a journey. However, there are some basic principles that can help along the way. Join CyberArk and Optiv + ClearShark's leaders on December 5th as they share insights and "confessions" into implementing Zero Trust security principles, emphasizing that it...
Meeting Network Analysis & PCAP Requirements
Trellix Network Security won the NAVWAR Cybersecurity Challenge at identifying never-seen-before (“signature-less”) attacks by observing network activity. It also received the Gold Globe Cyber Security Global Excellence Award for Network Detection & Response (NDR). Think of “NDR” as a sibling to “Endpoint Detection & Response (EDR)” working together to detect threats and optimize the response to inci...
The Low-Down: Network & Cloud Security...
Join Juniper Networks & Carahsoft for an informative webinar where we will explore the critical aspects of network and cloud security for SLED organizations. Learn how to design and implement robust security measures to safeguard your sensitive data and systems. In this webinar, attendees will hear Juniper SME's discuss:Introduction to Network and Cloud Security: Gain an understanding of the importance of a well-designed security architect...
PeopleSoft Identity Governance: Top 3 B...
As higher education institutions face increasing challenges with managing student enrollment and identity governance, ensuring security and compliance while automating processes is critical. Join Pathlock and Carahsoft for this higher education special event where we will explore the top 3 best practices for creating and automating a secure student enrollment process within PeopleSoft, as well as learn how to enhance security, streamline enrol...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Doing Business Through Leading GWACs
Government-wide acquisition contracts and other large multiple award vehicles are the dominant avenue for doing business with the government. We’ll dive into an analysis of GWACs, MACs and the BICs – best-in-class contracts. We’ll address questions such as how these vehicles are being used, who is using them and who are the dominant contractors that hold the prime positions on these vehicles. Government leaders who manage the...
Overview of the CMMC Compliance Model
Join us for a compelling 2-hour overview CPE training event where we will dive into the world of the Cybersecurity Maturity Model Certification (CMMC). This program, being developed by the Department of Defense, is an assessment framework and assessor certification program aimed at enhancing trust in compliance measures related to cybersecurity. In this overview, we'll provide key insights into the Cybersecurity Maturity Model Certification (C...
Harnessing Automation to Reach Zero Tru...
All federal agencies are working to meet the Office of Management and Budget mandate to establish a zero trust architecture for their systems – a key element in improving cybersecurity across agencies. The National Security Agency (NSA) has laid out the seven pillars of Zero Trust: User, Device, Network & Environment, Application & Workload, Data, Automation & Orchestration, and Visibility & Analytics. In July the agency...
December 9, 2024
Organizer:
FedInsider Location:
Webcast
SSCP | Official ISC2 Training Week
SSCP | Official ISC2 Training Week 40 CPE’s Official ISC2 SSCP certification provides a comprehensive review of the knowledge required to effectively gain advanced technical skills and knowledge to implement, monitor, and administer IT infrastructure using information security policies and procedures. Participants receive the following with registration: Official ISC2 SSCP Student Training Guide (eBook) 180-Day Access to Class Recordings...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.