Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Beyond the Fundamentals of Fundamental...
August 25, 2015 Instructor: Matthew Goldstein California CLE Credit Approval (1.5 Credit Hours) Pending Learn More ECoP®EAR or ITAR renewal credits = 1 Many universities and research institutions rely on the Fundamental Research Exclusion to perform research activities subject to U.S. export control regulations without a license. However, the exclusion is often misunderstood and improperly applied. In this webinar, Washington D.C. internat...
Instructional Series: ITAR Agreements
How to prepare, administer and handle after approval actions for TAAs, MLAs and WDAs. In this installment of our instructional webinar series we will address the most complex US Government export authorization, the Department of State’s agreements, including Technical Assist Agreements (TAA), Manufacturing License Agreement (MLA) and the Warehouse and Distribution Agreement (WDA). If you are exporting technical data or providing a defens...
EEOC's 18th Annual EXCEL Training Conference
In its 18th year, the EXCEL Training Conference is the premier national training conference for federal and private sector EEO managers, supervisors, practitioners, HR professionals, attorneys and ADR specialists. The employer community, both the private and public sector, will gain invaluable knowledge for making those tough HR decisions! Learn the latest EEO developments from the EEOC experts who enforce EEO laws and from other federal high...
Export Enforcement Interactive Webinar
It is true of export compliance that being an exporter means – in all probability – your company will eventually commit an export-related violation. Between the ITAR, the EAR and seemingly endless bodies of OFAC sanctions regulations, with all their complexities and ambiguities, it is frighteningly easy to run afoul of the rules. Sooner or later, you will face an export violation, or at least facts which might indicate a violation....
Asia Pacific Export Controls 2015 Update
Special Focus on Control Lists and Classification The last few months have been one of the most robust single periods of Asia export control development in a decade. There will continue to be changes as we move through 2015 and into 2016, with some countries making modifications to their existing export controls and others taking important steps to establish a national export control system for the first time. One of the biggest areas of chan...
Asia Pacific Export Controls 2015 Update
The last few months have been one of the most robust single periods of Asia export control development in a decade. There will continue to be changes as we move through 2015 and into 2016, with some countries making modifications to their existing export controls and others taking important steps to establish a national export control system for the first time. One of the biggest areas of change has been in national export control lists. Since...
Webinar on California’s Adaptation Stra...
California’s Adaptation Strategies and Challenges for Addressing Changing Precipitation Patterns and Drought Date and Time: Friday, July 24, 2015; 1:00 - 2:30 PM EDT Webinar Link: https://share.dhs.gov/california_precipitationdroughtjuly24/ Dial in Number: 888-566-7705; Participant passcode: 2385714 * The webinar link and dial-in information will also be sent to all registered participants.* The National Protection and Programs Directora...
8th Annual Senior Government Executive Dinner
Join Young AFCEA Bethesda on July 23, 2015 for the 8th Annual Senior Government Executive Dinner. This premier networking event brings together senior government executives and emerging government leaders for an engaging discussion on next-generation technologies fueled by innovation. The event is centered on roundtable discussions with government and industry guests, moderated by industry leaders. Table discussion topics include: Cloud ...
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.