The Rise of Cyber-Physical-Human System...
Digital technology, physical systems and human beings are more integrated than ever. This trend has led to the emergence of cyber-physical human systems (CPHS). This field focuses on the integration of cyber technologies, physical systems and human actions to accomplish a specific goal. Smart buildings, autonomous vehicles and telemedicine applications are all examples of CPHS within the rise of artificial intelligence – They aim to enha...
Cyber Compliance Training Series
10 part Weekly Cyber Compliance Training Series. 30 minutes class followed by 30 minutes Q&A Every Fridays from 12 - 1 EST and cover the following topics: 12-15-23 Module 1: Introduction to Cyber Security Compliance 1-5-24 Module 2: Writing a System Security Plan (SSP) 1-12-24 Module 3: Developing Policies and Procedures 1-19-24 Module 4: Incident Response Planning Fundamentals of Incident Response Creating an Incident Response Plan Role-p...
Protecting Privacy from the Ground Up
Privacy is an often-overlooked aspect of cybersecurity. With the growth of AI and evolving privacy legislation, however, state and local agencies will need to understand how to select and integrate technologies that not only meet compliance standards but also promote maximum privacy and trust. Overwhelmed with stories of hacks, attacks, and the prying eyes of private companies and public agencies, fatigued defenders may feel that even attempti...
AFCEA Aberdeen/AOC APG Susquehanna - Ja...
Join the AFCEA Aberdeen chapter for our first regular monthly luncheon of Calendar Year 2024, hosted jointly with AOC APG Susquehanna. Our event will feature a panel of speakers from PEO IEW&S. Government/Military - Please register using your official .mil email address. Note that this registration type only applies to active-duty or Civilian workforce, not Industry Contractors.
Accelerating Your Generative AI Journey...
Creating an Adoption Plan: Set your users up for success with prompt-engineering tips, defining best practices, and communicating on early wins. Generative AI’s nearly unlimited potential has been top of mind for many leaders, but figuring out where to start and how to make it real has been challenging for many. While consumer-grade GenAI was grabbing headlines, it became critical for organizations to begin building their plans for its e...
Phishing-Resistant, Frictionless Consum...
Passwords are a constant point of frustration for consumers and businesses—often cited as the reason for security issues and poor user experiences. Here at Okta, we believe passkeys are a viable alternative to passwords that are more secure and easier to use. In this joint webinar with the FIDO Alliance, we’ll discuss: Why passkeys are an important innovation to eliminating passwords How they can help businesses deliver seamless an...
January 18, 2024
Organizer:
Okta Location:
Webcast
CIOs, Avoid These Pitfalls in Your Stra...
Strategic cost optimization is more than just cost cutting. CIOs must drive a culture that proactively looks for ways to optimize spend prior to contractual commitment and recover current spend on projects and services that are underperforming or in which there is overinvestment. CIOs continue to experience cost pressures due to their geography or global pressures, making it difficult for them to help the enterprise achieve its objectives whil...
January 18, 2024
Organizer:
Gartner Location:
Webcast
How State & Local Governments Can Secur...
State and local governments and education produce large amounts of unstructured data in a wide range of data types. From student report cards that contain personally identifiable information (PII) to municipal tax rolls full of information that fraudsters want to steal, these organizations have a data protection challenge on their hands. Keeping these diverse data sets safe and ensuring their high availability are essential for smooth educatio...
January 18, 2024
Organizer:
FedInsider Location:
Webcast
MAS Office Hours
Every third Thursday of the month, the MAS PMO hosts a webinar dedicated to a specific topic of interest for our MAS Industry Partners. Topics are broken down and explained using plain language and real-world examples. This is your chance to engage directly with MASpolicy makers, program managers, and leaders from across GSA, live and in real-time. Bring your questions, because we will dedicate plenty of time to Q&A!
What in the World is Zero Trust - Why D...
One of the latest buzz terms being used is "Zero Trust" but what it is and why should anyone implement it. This webinar will go into the definition of what "Zero Trust" really is and why small to midsize businesses should consider some form of "Zero Trust" implementation. The "Zero Trust" framework is perfect for any organization that is working remotely or using a hybrid work model with employees working both in the office and/or remotely. If...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.