Back to Search Begin New Search Save Search Auto-Notify
ISACA CISA Training Boot Camp
Infosec’s CISA Boot Camp extensively prepares you for the ISACA CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors:Information systems auditing processGovernance and management of ITInformation systems acquisition, development and implementationInfor...
February 17-21, 2025
Organizer: Infosec
Location: Virtual
Add Favorite
Denver Cybersecurity Conference
Don’t miss the Denver Cybersecurity Conference! Gain critical insights on tackling 2025’s cyber threats, connect with top industry leaders, and engage in hands-on discussions with global cybersecurity providers. Secure your spot now to stay ahead of emerging challenges and strengthen your organization’s defenses. Admission is $150 (without a promo code) and includes a catered lunch, breakfast, snacks, a cocktail networking re...
February 20, 2025
Organizer: Data Connectors
Location: Denver, CO
Add Favorite
Unifying IT Management: Real-Time Visib...
Join us on February 20 for an insightful webinar where we’ll explore how Tanium enhances ServiceNow’s CMDB and IT workflows with real-time, accurate endpoint data. Learn how this powerful integration improves operational efficiency, reduces downtime with faster remediation and better visibility, and streamlines vulnerability management and incident response.
February 20, 2025
Organizer: Tanium Government Team at Carahsoft
Location: Webcast
Add Favorite
Accelerate(her) presents: Personal Bran...
In today’s fast-paced and competitive tech landscape, having a strong personal brand is more important than ever. Whether you’re climbing the corporate ladder, leading a team, or breaking into new opportunities, your personal brand helps define your unique value and sets you apart in the industry. Join us for an empowering session tailored for women in technology, where we’ll explore how to craft a compelling personal brand t...
February 20, 2025
Organizer: Women in Technology (WIT)
Location: Webcast
Add Favorite
The Next Step: Insights on Effective Po...
Managing a grant doesn’t end once you’ve received the award—in fact, it’s often the beginning of your new journey as a grantor. That’s why effective subrecipient management is critical to ensuring that your project runs smoothly, remains compliant, and meets expectations. Join us online Thursday, Feb. 20 at 2 p.m. ET/11 a.m. PT to hear from government and industry perspectives about the work that is done after an...
February 20, 2025
Organizer: GovLoop
Location: Webcast
Add Favorite
Thought Leadership Thursday | February
Safeguarding the Future of Innovation and Creativity with Generative AI Position yourself at the forefront of technological advancements with Thought Leadership Thursday. This virtual interactive discussion allows you to engage with senior technology leaders skilled in implementing forward-thinking strategies. Learn to leverage the latest global technology to maximize workforce efficiency and maintain agility, keeping your company ahead of the...
February 20, 2025
Organizer: TechTalk Summits
Location: Virtual
Add Favorite
AI in the C-Suite: The Role of the CAIO
As AI reshapes industries and redefines business capabilities, organizations increasingly recognize the need for trusted leadership to harness its transformative abilities. The Chief AI Officer (CAIO) has become an essential C-suite role, translating complex AI capabilities into actionable business strategies while ensuring security and operations align with mission-critical goals. During this breakfast event, join NextGov/FCW to explore the m...
February 20, 2025
Organizer: GovExec
Location: Washington, DC
Add Favorite
Cybersecurity Monitoring Across Defense...
One of the biggest challenges in cybersecurity is how to monitor cybersecurity and risk across multiple systems, whether within a single federal agency or throughout a sprawling department. The U.S. Department of Defense has a program in place – Continuous Monitoring and Risk Scoring (CMRS) – to address the challenge. As the largest military force in the world, one with a global network of communications and IT systems, it is criti...
February 20, 2025
Organizer: FedInsider
Location: Webcast
Add Favorite
CTO Sessions: Best Practices for Implem...
Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memorandum on Promoting US Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems and Quantum Computing Cybersecurity Preparedness Act stress the need to update IT infrastructure today to combat the quantum threat. Both policies emphasize the use of cryp...
February 20, 2025
Organizer: Thales TCT Government Team at Carahsoft
Location: Webcast
Add Favorite
Red Hat OpenShift Service on AWS (ROSA)...
Join us for a hands-on experience for you to work directly with our Red Hat and Amazon Web Service (AWS) experts to try Red Hat� OpenShift� Service on AWS without commitment. Ask questions, follow along with the demo and create your project in the console to get a feel for how Red Hat OpenShift Service on AWS will work for your team and workloads. This 2-hour, live online workshop is ideal for developers, architects and operations engineers wh...
February 20, 2025
Organizer: Red Hat
Location: Virtual
Add Favorite
Back to Search Begin New Search