Back to Search Begin New Search Save Search Auto-Notify
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
December 17, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
F5 | FireEye SPAWAR TechTalk
PKI Identity and Break & Inspect Please join F5 Networks, FireEye, and GuidePoint to learn and discuss how GuidePoint has leveraged F5 and FireEye to create a comprehensive security solution that combines application delivery infrastructure with advanced content security, including: network segmentation and policy management, protocol conformance, DDoS mitigation, SSL inspection, advanced threat protection, intrusion prevention, threat int...
December 7, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: San Diego, CA
Add Favorite
SANS San Francisco 2015
You are invited to attend another great SANS training event in "The City by the Bay." SANS San Francisco 2015 will be in the heart of the city at the Hilton San Francisco Union Square campus.Some of our courses are in alignment with DoD Directive 8570 requirements for Baseline IA Certifications. Several courses also have GIAC Certification attempts available. See the GIAC homepage for more information.Register for SANS San Francisco 2015, and...
November 30 - December 5, 2015
Organizer: SANS Institute
Location: San Francisco, CA
Add Favorite
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based App...
December 3, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Hanscom Air Force Base, MA
Add Favorite
F5 Gov TechTalk SSL Break and Inspect
Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS...
December 3, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: St. Louis, MO
Add Favorite
F5 Air Force TechTalk SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based App...
December 1, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Wright-Patterson AFB, OH
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
GTRA SecureGOV Council Summit
Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issue...
November 15-17, 2015
Organizer: Government Technology Research Alliance (GTRA)
Location: Hot Springs, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
October 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search