Back to Search Begin New Search Save Search Auto-Notify
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 9, 2015
Organizer: FEDINSIDER
Location: Charleston, SC
Add Favorite
William Oliver Baker Award Dinner
Join INSA as we present the Honorable Mike Rogers and C.A. Dutch Ruppersberger with the 31st William Oliver Baker Award on Friday, June 5, 2015. Rogers and Ruppersberger will be honored for their outstanding service to the U.S. intelligence and national security communities.
June 5, 2015
Organizer: Intelligence National Security Alliance
Location: Washington, DC
Add Favorite
SANS ICS Houston Summit & Training
SANS has joined forces with industry leaders and experts to strengthen the cybersecurity of Industrial Control Systems (ICS). The initiative is turning ICS cybersecurity around by equipping both security professionals and control system engineers with the security awareness, work-specific knowledge, and hands-on technical skills they need to secure automation and control system technology. Register now for these ICS skills based courses. Why I...
June 1-5, 2015
Organizer: SANS Institute
Location: Houston, TX
Add Favorite
Digital Transformation in Government: B...
The growth of the digital economy is fueled by hyper connectivity – Internet of Things, social collaboration, and electronic delivery of services. Whether the challenge is information exchange among medical clinicians to improve patient care, fleet-wide predictive maintenance of marine vessels, or conservation data to protect endangered species, digital data is transforming the way government works. Government agencies collect and manage...
June 4, 2015
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
The 2015 Government Innovation Forum
You are invited to join your colleagues at the 2015 Government Innovation Forum to focus on Enabling Secure and Agile Operations. This is your opportunity to engage the dialogue and learn how to secure and optimize agency business with: • Emerging technologies for government applications • Dynamic tools and strategies to address current cybersecurity threats • Proven approaches to advance cloud, mobile, and collaboration initia...
June 4, 2015
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
June 3, 2015
Organizer: Websense, Inc.
Location: Webcast
Add Favorite
TakeDownCon Capital Region Hacking and...
TAKEDOWNCON: CAPITAL REGION 2015 TakeDownCon, Hacking and IT Security Conference, is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on th...
May 28 - June 2, 2015
Organizer: EC-Council
Location: East Hyattsville, MD
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
SANS Pen Test Austin 2015
We have a really special event brewing for you at SANS Pen Test Austin 2015, and you've gotta check it out. Every organization needs skilled people who know how to find vulnerabilities, understand risk, and help prioritize resources based on mitigating potential real-world attacks. That's what SANS Pen Test Austin is all about! If you like to break things, put them back together, find out how they work, and mimic the actions of real-world bad...
May 18-23, 2015
Organizer: SANS Institute
Location: Austin, TX
Add Favorite
Cybersecurity Game Changer: Real-Time S...
How are agencies leveraging real-time analytics in a data-intensive government? The Internet of Things and explosions of big data are increasing the volume, variety, and velocity of information. This is driving the need for real-time data analytics in areas such as risk management, fraud detection, network monitoring, and intelligence and surveillance. Agencies have “right now” decisions where real-time insight can affect national...
May 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search