State of the States
States, counties, municipalities, territories, and tribal governments have many interactions with their residents every year, addressing many facets of everyday life – from schools to roads, water and sewer services to business licensing. The National Association of State CIOs (NASCIO) identified the top 10 priorities of its members for 2025. While strengthening cybersecurity and risk management continues as the top priority, state CIOs...
May 20, 2025
Organizer:
FedInsider Location:
Webcast
VETS 2 DPA Training
Who Should Attend:All federal users including contracting officers, program office officials, managers, and executive staff are invited to participate in these complimentary webinars to learn how the VETS 2 GWAC can support their agency IT project initiatives. Warranted contracting officers must complete this training before requesting a Delegation of Procurement Authority (DPA), which will authorize them to issue orders against the VETS 2 GWA...
Perched on the Edge of Chaos
There is a critical conversation to be held on safeguarding U.S. critical infrastructure against persistent and evolving cyber threats. With global adversaries increasingly targeting power grids, communications networks, water systems, and other essential services, the urgency to fortify national cybersecurity has never been greater. Meanwhile, artificial intelligence, machine learning, and automation continue to evolve. Organizations must ret...
May 19, 2025
Organizer:
FedInsider Location:
Webcast
Cybersecurity: Building Resiliency, Red...
Join us as thought leaders from government and industry share how they are managing the cyber defenses of some of our nation’s critical agencies. Government agencies need to strengthen cybersecurity defenses while reducing cost and eliminating unnecessary applications. Agencies seek to gain complete visibility and consolidation of data across multiple sources, both to strengthen their security posture and become more efficient through ap...
May 16, 2025
Organizer:
FEDINSIDER Location:
Webcast
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
Seattle Cybersecurity Conference
Join Us in Seattle for the Futurecon Cybersecurity Event!Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.Don’t miss our special ceremony recognizing our...
May 15, 2025
Organizer:
FutureCon Location:
Bellevue, WA
SecureWorld Houston
Join your regional cybersecurity community for high-quality, affordable training and collaboration. Earn 6-12 CPE credits through 15+ educational sessions learning from local and nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays—all while networking with peers in InfoSec.
May 15, 2025
Organizer:
SecureWorld Location:
Houston, TX
Unifying the Tactical Edge Roadshow
The modern battlefield isn't just physical - it's digital, and the threats are relentless. Cyber adversaries are constantly evolving, probing for weaknesses in our defenses. Staying ahead of threats demands a unified, battle-ready network that can withstand any attack on every layer of security. Are you ready to fortify your network against evolving threats? Building a resilient and unified tactical network is essential to defending against so...
IRC Section 125 Status Change Events an...
When an employee requests to make a mid-year election change to their benefit elections, employers must consider multiple factors, such as whether the election change is permitted under the Section 125 plan, in addition to the facts and circumstances of the request and the timing of the request. This is due to the complexity surrounding Section 125 Cafeteria Plan status change rules and HIPAA special enrollment events.This webinar discusses th...
Secure by Demand: Proactive Strategies...
The proliferation of mobile apps, both for professional and personal use, has created a massive, often overlooked attack surface. The use of “shadow IT,” software that hasn’t been approved by IT, further increases the risk of data leaks and policy violations at a time when IT teams and resources are stretched thin. With the shift from “Secure by Design” to “Secure by Demand,” trusting software developm...
May 15, 2025
Organizer:
ATARC Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.