Getting to Continuous Authorization to...
One of the most beneficial practices any agency can implement is achieving and maintaining Continuous Authorization to Operate (cATO). It allows an organization to maintain ongoing authorization for their systems and software, rather than having to obtain a one-time ATO for each deployment. Gaining a cATO requires agencies to implement continuous monitoring of the security of their systems and practicing active cyber defense measures that proa...
July 15, 2025
Organizer:
FedInsider Location:
Webcast
Non-Human Identity (NHI) Summit 2025
The rise of non-human identities (NHIs) is reshaping the cloud security landscape. APIs, service accounts, bots, and machine identities now outnumber humans in most cloud environments—and they often hold the keys to your most critical systems. Join global cloud and identity experts for CSA’s first-ever Non-Human Identity Summit, a free, two-day virtual event dedicated to tackling the complex challenges of NHI management. NHI Summit...
HEC-RAS
This course provides an introduction of HEC-RAS with applications to dam safety. The course provides a hands-on opportunity to use the program and resolve specific questions. The objective of this course is to review the basic principles of open channel hydraulics as they relate to the natural stream environment with application to dam safety. Bridges, culverts, and in-line structures will be discussed and both steady and unsteady flow modelin...
Understanding and Navigating the Servic...
OverviewFailure to understand and comply with the McNamara-O’Hara Service Contract Act (SCA), or Service Contract Labor Standards (SCLS) can lead to costly outcomes, withholding of contract funds, and even debarment. Cross-functional (i.e., Human Resources, Contracts, Payroll, Accounting) understanding of the SCA is imperative to successfully administer an SCA contract. Many contractors find SCA confusing and intimidating, which often le...
The Two-Edged Sword of AI in Cybersecurity
Artificial Intelligence (AI) is transforming cybersecurity for the better—empowering teams to detect threats faster, reduce false positives, and identify risky behavior before it becomes a breach. But there are risks associated with AI: first, that AI tools currently are new to organizations and under-regulated for their own cybersecurity, so require careful review; also, as defenders become more sophisticated with those AI tools, so do...
July 16, 2025
Organizer:
Fedinsider Location:
Webcast
Securing the Blind Spots of On-Prem Ser...
In this webinar, attendees will learn how to:Understand the hidden risks of Non-Human Identities (NHIs): Explore the security challenges NHIs pose in hybrid environments and why traditional identity tools fall short.Gain visibility and control: Learn how to discover, classify and monitor NHIs across on-prem and cloud systems using Silverfort’s Identity Security Platform.Strengthen your identity security posture: See how real-time risk as...
Defending the DON: Validating Cyber Rea...
In this session, attendees will: Gain quantifiable insights into your security posture by seeing how Mandiant Security Validation (MSV) continuously tests your network, endpoint, cloud, and email security controls against real-world threat actor tactics. Optimize existing security investments and configurations while justifying security spend with empirical performance data and clear reporting on identified gaps and cyber readiness. Learn to a...
Zero Trust Training | CCZT
In the dynamic realm of digital security, the necessity for advanced cybersecurity measures is paramount. Progressive companies committed to protecting their digital infrastructure should focus on supporting their employees’ professional growth by enrolling them in the Certificate of Competence in Zero Trust (CCZT) training. This specialized course provides an in-depth exploration of the Zero Trust framework, arming participants with cut...
FLGISA 2025 Annual Conference
We invite you to join us for the Florida Local Government Information Systems Association 2025 Annual Conference at the Signia by Hilton Orlando Bonnet Creek on July 21-24, 2025. The conference is open to all Florida local government agency technology professionals. Benefits of Attending the 2025 Annual Conference:Network with over 350 local government technology leadersLearn about the latest technology and security trends15 hours of CEU credi...
July 21-24, 2025
Organizer:
FLGISA Location:
Orlando, FL
CCSP | Official ISC2 Training Week
ISC2 Certified Cloud Security Professional 40 CPEs ISC2’s CCSP certification is a globally recognized credential that validates the expertise and knowledge of professionals in designing, implementing, and managing cloud security programs, policies, and architectures. The CCSP is valued by organizations seeking professionals capable of addressing the security challenges associated with cloud computing and ensuring the confidentiality, int...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.