Cybersecurity Technical Excellence Event
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
Internal Audit Basic Training Workshop
Join us for a unique, interactive course that "walks you through" the Internal Audit process. "This course is not just for auditors or new auditors. It is for anyone who wants an understanding of the relationship between business objectives, risk, control, assessment and reporting." This comprehensive internal audit training course is for anyone who wants to have a strong base of knowledge and understanding of the essential audit and the perso...
Project Management Excellence Training...
Join us for a unique, interactive course that "walks you through" the project management process and tradecraft needed to be an effective project manager. This introductory level training in project management helps to prepare the attendee with little-to-no formal project management training to run small, simple projects in the work environment: construction, technology and development. The emphasis is on introducing the terminology along with...
Cybersecurity Risk Program Training Academy
New cybersecurity risk regulations for all organizations are approaching faster than you might think. "Computers, software, programming and algorithms are all parts of a cybersecurity risk program, but it is the interaction with the "humans" that makes all the difference in the world." An effective cybersecurity risk program requires an organization to have everything from program policies to incident response plans to specific breach notifica...
Internal Audit Basic Training Workshop
Join us for a unique, interactive course that "walks you through" the Internal Audit process. "This course is not just for auditors or new auditors. It is for anyone who wants an understanding of the relationship between business objectives, risk, control, assessment and reporting." This comprehensive internal audit training course is for anyone who wants to have a strong base of knowledge and understanding of the essential audit and the perso...
Internal Audit Advanced Training Course
This focused three-day course helps the experienced internal auditor to understand the underlying concepts and principles that drive the practice of internal auditing. The attendees will learn the concepts that are behind audit planning, performance, reporting, and followup. It is ideal for senior auditors and those preparing to be an audit team manager. "Internal Audit Advanced Training" is the perfect CPE course to provide a focused review o...
Cybersecurity Technical Excellence Workshop
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
MIL-STD-188-164C/CN1 Industry Day
The Department of Defense (DoD) is soliciting industry to provide comments on the recently release of MIL-STD-188-164C and prepare responses to satisfy unique DoD requirements to be included into the 164C/CN1 Draft. Responses should include, but are not limited to, specification adjustments in the following areas of interest: 1) Transmit phase linearity; 2) Transmit amplitude response; 3) Phase noise; 4) Maximum power flux densities; 5) Receiv...
AWS+Monkton: Building NIAP Compliant Mo...
At this event, AWS+Monkton and our Mission Mobility Partners will discuss approaches to rapidly developing meaningful mission enabling mobile-cloud solutions that adhere to Government policies and security requirements. An audience attendee will be embedded with our dev team to build a CUI (sensitive) NIAP compliant mobile app during the course of this event and demonstrate it at the end. Dates (Government): Thursday, November 29 from 9:00am -...
December 13, 2018
Organizer:
AWS Location:
Washington, DC
The Agnostic Introduction to Technology...
*SAVE $50 via GovEvents Registration Registration fee The Agnostic Introduction to Technology Business Management (TBM) for Federal IT Compliance (1 Day). This one day overview and introductory course allows the attendee to be eligible for eight (8) Continuous Learning Points (CLPs) for continuing professional education towards a variety of certifications and practices. Technology Business Management means different things to different people....
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.