DETAILS The ISACA GWDC is bringing back our CRISC Fall Review 2021 course, this year virtually! The CRISC Fall Review 2021 Course is an intensive 3-day review course for the ISACA Certified in Risk and Information Systems Controls™ (CRISC) Exam. The CRISC Fall Review 2021 Course will provide practical advice on … [Read more...] about CRISC Fall Review 2021 Course
CRISC Spring Review 2021 Course
DETAILS The ISACA GWDC is bringing back our CRISC Spring Review 2021 course, this year virtually! The CRISC Spring Review 2021 Course is an intensive 3-day review course for the ISACA Certified in Risk and Information Systems Controls™ (CRISC) Exam. The CRISC Spring Review 2021 Course will provide practical advice on … [Read more...] about CRISC Spring Review 2021 Course
CSX Cybersecurity Fundamentals Training – Fall 2020 (Multi-Day Event)
INSTRUCTOR | ADDITIONAL DETAILS | CPE INFORMATION | REGISTRATION DETAILS DETAILS Cybersecurity is a growing and rapidly changing field that touches every part of our lives. It is critical that cybersecurity concepts are understood by everyone from developers to audit professionals who are involved and concerned with … [Read more...] about CSX Cybersecurity Fundamentals Training – Fall 2020 (Multi-Day Event)
CRISC Review Course 2020 (Multi-Day Event)
DETAILS ISACA GWDC is sponsoring an intensive 3-day review course for the Certified in Risk and Information Systems Controls™ (CRISC) Exam. The CRISC review course will provide practical advice on preparing for the CRISC exam. Our CRISC review course provides specific instruction regarding the job practice areas … [Read more...] about CRISC Review Course 2020 (Multi-Day Event)
Hackable: How to Do Application Security Right
Join us July 30th from 12pm-1250pm for our workshop on Hackable: How To Do Application Security Right. You're building an application and need to prove it's secure, and to do that you need to find vulnerabilities and fix them. However, there's so much confusion about what that even means, let alone how to do it right, that … [Read more...] about Hackable: How to Do Application Security Right
My Journey into Cybersecurity at NIST
Join us June 23rd from 12pm-1250pm for our workshop on My Journey into Cybersecurity at NIST. Join Nakia as she discusses her journey into cybersecurity at NIST and relevant NIST frameworks and resources that can help individuals map out their career. Speaker Name: Nakia Grayson Speaker Bio: Nakia Grayson is part of the … [Read more...] about My Journey into Cybersecurity at NIST
The Future Is Now – Security Considerations In a Serverless World
Join us June 18th from 12pm-1250pm for our workshop on Security Considerations In a Serverless World. In 2019, researchers at Berkeley published "Cloud Programming Simplified: A Berkeley View on Serverless Computing" where they predicted that "Serverless computing will become the default computing paradigm of the Cloud … [Read more...] about The Future Is Now – Security Considerations In a Serverless World
Annual General Meeting 2020
Come join the ISACA GWDC for our half-day virtual Annual General Meeting 2020 Conference and training event covering a variety of hot topics relevant to current trends, and associated challenges in cyber-security, cloud computing, Privacy, etc. The Annual General Meeting 2020 is designed to educate IT practitioners who want … [Read more...] about Annual General Meeting 2020
Evolution of Artificial Intelligence, Machine Learning, and Deep Learning in Cyber Security
Join us June 4th from 12pm-1250pm for our workshop on Evolution of Artificial Intelligence, Machine Learning, and Deep Learning in Cyber Security. Machine learning, deep learning, and neural networks are all huge buzzwords dominating any conversation about artificial intelligence, causing confusion in the AI domain. For … [Read more...] about Evolution of Artificial Intelligence, Machine Learning, and Deep Learning in Cyber Security
The Quietly Growing Dangers of Deepfakes
Join us on May 19th at noon for a Deepfakes cyber workshop. In this presentation, the topic of deepfakes will be explored, to include history, current uses, and future growth, as well as the possibilities and implications of this technology. Specific emphasis will be on how this technology has been exploited, and what … [Read more...] about The Quietly Growing Dangers of Deepfakes
