CISSP | Official ISC2 Training Week
ISC2 CISSP Training Week 40 CPE’s The World's Premier Cybersecurity Certification is 30 years old! Official ISC2 CISSP Training provides candidates with a thorough review and refreshes their information security knowledge in pursuit of the CISSP exam. Students will gain knowledge in information security that will increase their ability to successfully implement and manage security programs in any organization or government entity. The go...
Minneapolis Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
April 10, 2025
Organizer:
FutureCon Location:
Minneapolis, MN
Axonius Adapt Boston 2025
Adapt to the Future of Cybersecurity - Get Ready to Take Action! We are taking Axonius Adapt on the road! Join us in Boston for Adapt in Action. This one day event is for Security, IT, and Risk professionals collaboratively working towards a more resilient cyber future – where teams have full actionability over their distributed technology footprint, feel prepared for just about anything, and have time to become more proactive and work o...
April 10, 2025
Organizer:
Axonius Location:
Boston, MA
Harnessing Generative AI: Transforming...
As federal agencies confront increasingly sophisticated cyber threats, the need for robust cybersecurity programs have never been greater. Generative AI offers a transformative opportunity to enhance key aspects of federal cybersecurity, including threat detection, vulnerability management, security operations, and compliance activities. Moving beyond traditional, human-driven analyses and pre- defined rules, Generative AI enables capabilities...
April 10, 2025
Organizer:
ATARC Location:
Webcast
Cyber Resilience with Forward Networks:...
Are you looking to stay ahead of:Latest cybersecurity threatsBest PracticesCutting-edge technologiesIf you answered yes to any of the above, join us for an exclusive 5-part webinar series covering key topics in cyber risk management, threat detection and advanced security strategies with the opportunity to earn 1 CPE credits per webinar! March 13 - Cyber Data Call Handling March 27 - Cyber Threat PrioritizationApril 10 - Zero Trust Network Val...
The Future of ID Management: Public Sec...
As the public sector continues to embrace digital transformation and zero trust security environments, the need for robust identity management is paramount. “The Future of Identity Management: Public Sector Best Practices” virtual workshop will explore cutting-edge strategies and solutions that ensure secure and efficient identity verification and management. Attendees will gain an understanding of how to implement best practices t...
Harnessing AI & ML for Smarter Cybersecurity
As cyber threats grow more sophisticated, agencies must move beyond static defenses to intelligence-driven security. And while AI and machine learning (ML) enhance efficiency by detecting anomalies, forecasting risks, and accelerating response, agencies still need to address concerns about verification of alert evidence and suggested response actions. AI-powered security integrates with existing tools like Security Information and Event Manage...
April 10, 2025
Organizer:
FedInsider Location:
Webcast
PSHC Office Hours: Blanket Purchase Agr...
A GSA Multiple Award Schedule Blanket Purchase Agreement (BPA) is an agreement established by a government buyer with a Schedule contractor to fill repetitive needs for supplies or services (FAR 8.405-3). Buyers reduce administrative burden by eliminating repetitive activities such as searching for sources and needing to prepare new, complete requests for quotes for each Schedule order. Join us this month to learn how BPAs can help you streaml...
SecureWorld Philadelphia
Join your regional cybersecurity community for high-quality, affordable training and collaboration. Earn 12-18 CPE credits through 30+ educational sessions learning from local and nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and solution vendor displays—all while networking with peers in InfoSec.
April 9-10, 2025
Organizer:
SecureWorld Location:
King of Prussia, PA
Lookout Mobile Endpoint Security Hands-...
Threat actors want to access data that is now flowing between devices, apps, and networks via the cloud. Mobile devices, crucial for access and authentication into the services that host this data, are often the easiest to compromise - but they’re often the least protected despite the unique nature of their operating systems and significant risk they’re exposed to. Lookout provides a comprehensive solution that continuously grants...
April 9, 2025
Organizer:
Lookout Location:
Virtual
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.