1,690 past events found
+ 20 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Cyberattacks: 360 Degree View
THIS BRIEFING IS FOR SYSTEMS INTEGRATORS, GOVERNMENT AND MEDIA. In America and indeed across the globe, cyberattacks have risen to be a top national issue, with cyber-threat crossing the line to perpetuating violence in real life. Hacker groups, criminal organizations, and espionage units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. Government plays a pivotal role in maintaining the...
May 19, 2015
Organizer: FedInsider
Location: McLean, VA
Add Favorite
Cybercrime Trends and Scenarios – What...
Cyberattacks continue to evolve and plague the global economy. What was once an annoyance and something financial institutions needed to worry about has now morphed into a worldwide epidemic of attacks, breaches of personal information, financial loss to consumers, and personal accountability placed on company executives and boards of directors. At the same time, there are dozens of companies that purport to “solve” the security pr...
May 19, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
SANS/NH-ISAC Healthcare Cybersecurity Summit
SummitChairman: Jim Routh & Frank KimSummit Dates: May 12-13, 2015Training Dates: May 14-19, 2015SANS and the National Health Information Sharing & Analysis Center (NH-ISAC) are pleased to announce the 3nd Annual Healthcare Cyber Security Summit. Healthcare is undergoing major changes. Patients are demanding more convenient and personalized care. Digital health is changing the way that doctors and patients interact. New technologies al...
May 12-19, 2015
Organizer: SANS Institute
Location: Atlanta, GA
Add Favorite
(ISC)² CyberSecureGov
Join us for an insightful two days as cybersecurity experts from government, industry, and academia share on how to maximize resources in order to keep pace with cyber threats. Attendees will gain an in-depth knowledge on what new threats —and solutions— are emerging, the future legislative and political landscape, funding new initiatives in a post-sequestration reality, effectively adopting federal security initiatives and guidanc...
May 14-15, 2015
Organizer: (ISC)²
Location: Washington, DC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
IT Security Crisis
Today’s dynamic IT environments continue to become more complex than ever before. As a result, knowing what hardware and software you have or procured, their lifecycle status, current manufacturer, Windows compatibility and Open Source exposure are key to ensuring what was initially a secure platform, does not suddenly become a major vulnerability. If you can’t describe your IT baseline accurately and immediately, you can’t p...
May 12, 2015
Organizer: FedScoop and BDNA
Location: Washington, DC
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The Cloud Security Alliance Federal Summit
The Cloud Security Alliance Federal Summit is a free for government, full-day event being held May 5, 2015 at the Ronald Reagan Building & International Trade Center in Washington, DC. Expected to attend are over 250 well-qualified attendees with an interest in cloud security, primarily from federal agencies and related organizations. Program Topics CSA Software Defined Perimeter (SDP) Initiative Status of CSA and FedRAMP collaboration eff...
May 5, 2015
Organizer: Cloud Security Alliance
Location: Washington, DC
Add Favorite
SANS Security Operations Center Summit...
As we see regularly in the news, the number of successful data breaches continues to increase. Adversaries seem to have the upper hand, as many organizations fail to effectively detect and quickly respond to these breaches. Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams, and are often caught by surprise. As a result, executives are demanding that their security teams provid...
April 24 - May 1, 2015
Organizer: SANS Institute
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search