Zero Trust 101: Start Your Journey Here
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
January 8, 2025
Organizer:
Zscaler Location:
Webcast
Panel Discussion: Setting Your Pace in...
It can seem impossible to keep up in the exhilarating, and often exhausting, world of AI. But what if you don't have to? In this complimentary Gartner AI panel discussion webinar, Distinguished Vice President Analysts, Mary Mesaglio, Hung LeHong, and Arun Chandrasekaran will take your questions and dive deeper into one of our most popular topics of the year - how all CIOs and IT executives can set their own pace in their race to deliver AI out...
January 8, 2025
Organizer:
Gartner Location:
Webcast
Runtime Protection Bootcamp
Welcome to the Runtime Protection Bootcamp — where expertise meets hands-on action. Get ready for an immersive session guided by cloud security experts and stay ahead of evolving threats.What You’ll ExperienceHost, Container and Serverless Protection: Understand best practices for securing workloads at runtime with confidence.Hands-on Training: Dive into practical, expert-led sessions to elevate your cloud security skills.Prisma Cl...
3 Steps to Predict Market Trends and Di...
Today’s rapidly evolving business landscape requires anticipating trends that could lead to market disruptions and opportunities. Executive leaders operate in complex environments, with an overwhelming amount of information. They inevitably miss out on the value of the multitude of signals (insights or intelligence) that are not attended to within their business ecosystem which vary in strength. However, the weak signals, if assessed tho...
January 6, 2025
Organizer:
Gartner Location:
Webcast
The Gartner Cookbook for Cloud Strategy
To succeed with cloud computing, a business-outcome-driven cloud strategy is essential. Enterprise architecture and technology innovation leaders face increasing challenges in prioritizing and ensuring their cloud strategy aligns with both immediate and long-term business goals. Organizations without a cloud strategy are less likely to achieve their desired business and technology outcomes. Join this complimentary Gartner cloud webinar as a Ga...
January 2, 2025
Organizer:
Gartner Location:
Webcast
Managing Information Security (ISO 27001)
Join us for an insightful event, "Managing Information Security (ISO 27001)", where we will provide an overview of the ISO 27001 standard. This event aims to equip participants with the knowledge and understanding necessary to effectively start improving the management of information security within their organizations. ISO/IEC 27001 is a globally recognized standard for information security management systems (ISMS). It establishes a systema...
CMMC Level 1 Implementation
This CMMC (Cybersecurity Maturity Model Certification) Level 1 Implementation training event focuses on helping organizations establish a security foundation required for higher levels of the CMMC model. DoD contractors are required to be CMMC Level 1 certified by January 1, 2026. This first 4 CPE training event overviews the practices outlined in 48 CFR 52.204-21, which sets basic safeguarding requirements for covered contractor information...
Ransomware Risk Management (NIST 8374)
This training is designed to equip participants with the knowledge and skills needed to effectively manage ransomware risks within their organizations. Ransomware attacks pose a significant threat to businesses of all sizes, making it crucial for organizations to have effective risk management strategies in place. The NIST 8374 criteria provides a comprehensive framework for managing ransomware risks, aligning organizations' prevention and mi...
Implementing the HIPPA Security Rule (N...
This CPE training event is designed to provide participants with the knowledge and skills necessary to effectively implement the HIPAA Security Rule within their organizations. The HIPAA Security Rule focuses on safeguarding electronic protected health information (ePHI) to ensure its confidentiality, integrity, and availability. Implementing this rule is crucial for healthcare organizations and their business associates to protect sensitive p...
Risk Management Overview (ISO 31000)
Join us for a highly informative and engaging 1 CPE event, where we will review the world of risk management through the lens of the ISO 31000 standard. This event is designed to provide participants with an overview of the ISO 31000 standard and its significance in the field of risk management. ISO 31000, also known as "Risk Management – Guidelines," is an internationally recognized standard that offers principles, a framework, and a p...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.