Back to Search Begin New Search Save Search Auto-Notify
CyberCon 2015 - Military/Federal Cyber...
CyberCon 2015 is the forum for dialogue on cyber strategy and innovation to secure federal and defense networks, as well as private sector networks that hold their sensitive data. Addressing issues of enterprise architecture, collaboration, monitoring and authentication, network visibility and modernization, insider threats, Big Data and technical enablers, CyberCon 2015 will provide a roadmap for innovation and collaboration that lead to more...
November 18, 2015
Organizer: C4ISR & Networks
Location: Arlington, VA
Add Favorite
Splunk for Security Bootcamp
About the Splunk Security Bootcamp – Should be attended by people specifically interested in applying Splunk to the Security domain. Both core Splunk and Splunk for Enterprise Security will be used in the lecture and hands-on lab. This class does not cover Splunk interface basics so it is helpful to have an understanding of Splunk basics before attending. Where: Live Hands-on WebEx Webinar When: Check the GTRI Events Page for upcoming Bo...
November 18, 2015
Organizer: Global Technology Resources, Inc. (GTRI)
Location: Webcast
Add Favorite
Bridging The Great Minority Cybersecuri...
Cybersecurity has been identified as one of the most serious economic and national security challenges we face as a nation. Sadly however, there is global underrepresentation of women and other historically underrepresented minority groups (African Americans and Hispanics) in the fast-growing discipline of cybersecurity in the United States of America. "Grassroot Efforts” to increase the number of minority students pursuing cybersecurity...
November 17, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The 2016 Cloud Roadmap: Going Beyond "C...
Since the Office of Management and Budget first announced its "Cloud First" policy in 2010, agencies across government have been testing the cloud, developing new IT processes, and upgrading their existing infrastructure to make their operations cloud-ready. In many respects, the Cloud First policy has achieved its goal, providing agencies with evidence that the cloud makes it possible to deliver information and services to users working anywh...
November 17, 2015
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Simple Steps and Guidance to Secure Cla...
There are a variety of actions the military can take to improve their insider-threat-protection programs, including such common-sense steps as developing a baseline of normal activity and offering insider-threat awareness training to personnel with security clearances. Some organizations are farther ahead than others in implementing these steps, but there is no disagreement that these actions must be taken to mitigate insider threats. Barry Ro...
November 17, 2015
Organizer: C4ISR & Networks
Location: Webcast
Add Favorite
GTRA SecureGOV Council Summit
Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issue...
November 15-17, 2015
Organizer: Government Technology Research Alliance (GTRA)
Location: Hot Springs, VA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer: SecureAuth
Location: Chicago, IL
Add Favorite
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
November 12, 2015
Organizer: 1105 Media Public Sector Events
Location: Webcast
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
Back to Search Begin New Search