Back to Search Begin New Search Save Search Auto-Notify
Meet Your FY2016 FISMA Requirements: Us...
If you are in a Federal Agency, Military, or supporting contractor organization, you can successfully and effectively meet your FY2016 FISMA requirements by understanding the FISMA trends and proven successful, security strategies and solutions. Attendees will be provided: System deployment strategies to prevent OPM type attacks, like "air-gaps" and "connect-and-protect", Automated solutions to support "ongoing authorizations", Simple manageme...
November 17-18, 2015
Organizer: Digital Government Institute
Location: Falls Church, VA
Add Favorite
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
October 27-29, 2015
Organizer: Haines Security Solutions
Location: Galveston, TX
Add Favorite
SANS Cyber Defense San Diego 2015
Cyber security training in San Diego CA from SANS Institute, the global leader in Information Security training. SANS Cyber Defense San Diego 2015 features hands-on, immersion-style training courses for security professionals at all levels. Many of these security courses have Certifications that are aligned with DoD Directive 8570/8140 and most courses at this event are associated with GIAC Certifications. SANS delivers unparalleled security t...
October 19-24, 2015
Organizer: SANS Institute
Location: San Diego, CA
Add Favorite
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
October 20-22, 2015
Organizer: Haines Security Solutions
Location: Horsham (near Philadelphia), PA
Add Favorite
Federal IT Acquisition Summit
Register today for the second event in the Federal IT Acquisition Summit series on October 20th in Washington, DC. Hear from seasoned government professionals and decision makers as they provide insight on key issues that are reshaping the federal acquisition environment, as well as contract-specific training opportunities. Featured vehicles include GSA Alliant (including an Alliant 2 update), Army ITES-3S and ADMC-3, NASA SEWP V, and NIH CIO-...
October 20, 2015
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Vulnerability Assessments and Risk Anal...
A variety of five qualitative and quantitative methodologies are discussed in detail during this three-day workshop. The “do’s & don’t” of report writing are covered. Field evaluations are conducted. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This worksho...
October 13-15, 2015
Organizer: Haines Security Solutions
Location: Oxnard, CA
Add Favorite
SANS Seattle 2015
Information security training in Seattle from SANS Institute, the global leader in Cyber Security training. At SANS Seattle 2015, SANS offers hands-on, immersion-style security training courses taught by real-world practitioners and leading experts working in security today.The site of SANS Seattle 2015, October 5 - 10, is the Renaissance Seattle Hotel, located just minutes from Pike Place Market and upscale shopping, with stunning views of Pu...
October 5-10, 2015
Organizer: SANS Institute
Location: Seattle, WA
Add Favorite
Vulnerability Assessments and Risk Anal...
A variety of five qualitative and quantitative methodologies are discussed in detail during this three-day workshop. The “do’s & don’t” of report writing are covered. Field evaluations are conducted. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This worksho...
October 6-8, 2015
Organizer: Haines Security Solutions
Location: Rapid City, SD
Add Favorite
Beyond the Breach -- Security in the Cloud
There are two types of people – those who know they’ve been hacked, and those who don’t. Federal agencies, companies, and individuals are under attack every day from hackers, and our wealth of data is the ultimate prize. With outdated government data centers taking much of the blame in recent attacks, agencies are increasingly turning to the cloud for security. Still, no defense is impenetrable, and it’s only a matter o...
October 6, 2015
Organizer: Cloud Computing Caucus Advisory Group
Location: Washington, DC
Add Favorite
Cybersecurity vs. Data Security: Govern...
Digital networks across the country are currently threatened by wide-scale data theft, like the recent breach of the networks of the Office of Personnel Management (OPM), not destruction or compromise. What is the difference between cybersecurity and data security? And, what strategies are agencies using to prevent future data loss? This webinar will hear from government and industry experts who will discuss what government needs to do now to...
October 6, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search