The Anatomy of an Enterprise Cyber Attack
In 2009, Chinese hackers began stealing sensitive intellectual property from U.S. oil, gas and petrochemical companies. The attacks were attributed to the Chinese based on recognition of Chinese hacking tools previously identified on underground hacking sites and the attacks apparent origin in Beijing. Termed “Night Dragon,” these attacks included social engineering, spear-phishing attacks, exploitation of Microsoft Windows OS vuln...
April 11, 2012
Organizer:
NVTC Location:
Vienna, VA
DATA MINING: FAILURE TO LAUNCH
WHAT'S COVERED The vast majority of BI professionals are excited about the prospects of data mining, but are fully mystified about where to begin or even how to prepare. Of those who did initiate a modeling initiative, a recent data mining industry survey of predictive modeling practitioners reports that 51% of data mining projects either never left the ground, did not realize value or the ultimate results were not measurable. Despite its elus...
Virginia School Response Conference 2012
SRC 2012 in Virginia’s mission is to update and support the urgent endeavors of the whole educational sectors & academe on developing effective action plans that are unique to their own communities and engage the widest range of local stakeholders to make our high schools and college campuses safe and secure and to contribute to the advancement of the local community thru the aspect of Prevention, Protection, Response, and Recovery....
Selecting and Evaluating New and Underu...
Learn how to use the FEMP Technology Deployment Matrix to identify and select clean energy technologies that have a high potential for immediate deployment into agency energy-use reduction programs; assess potential benefits; execute market-based deployment strategies; and develop performance metrics to validate effectiveness and justify project funding. Archived streaming video available after the event 24/7 on the DOE FEMP website.
A Tidal Wave of Tablets: How to Manage...
A tidal wave of iPads, Androids and other tablets are flooding the enterprise market, as executives and employees alike are discovering that these devices can be used in innovative and productive ways. But with the advantages of new cutting-edge technology come complexities for enterprise IT staff, who have the responsibility of managing, supporting and securing these mobile devices, in addition to desktop and laptop computers. Cloud-based sol...
April 5, 2012
Organizer:
Winvale Location:
Washington, DC
DoD Electromagnetic Environmental Effec...
The Program Review will feature unclassified presentations for General Session Forums conducted throughout the week and a ½ day Restricted Session Forum for “Distribution Controlled and Classified Presentations.” This year will also include a full day Restricted Session Forum for the "Navy Day" agenda.Sponsored by the Defense Information Systems Agency (DISA) on behalf of the Spectrum Directorate of the Office of the Assista...
TECHEXPO Top Secret Polygraph Only Hiri...
ATTENTION Security-Cleared Polygraph Professionals: TECHEXPO Top Secret is producing a POLYGRAPH ONLY hiring event this April! Don't miss your chance to interview for a new career and earn your market worth at this exclusive event. Bring many resumes and interview for the many opportunities available in cyber security, information technology, engineering, aerospace, telecom, project management, intelligence, operations, homeland security, rese...
U.S. / Canada Border Security Summit
U.S.- Canada Border Security Summit: Benefiting the 501c3 nonprofit Roger Foundation and the RCMP National Remembrance Fund An “Intelligence-Based” Road Map for Securing and Managing the US – Canadian Border April 3 -4, 2012: Detroit, MI (Exact Location TBD) DSI’s U.S. - Canada Border Security Summit is designed as an educational and training “Town Hall” forum, where thought leaders and key policy-makers ac...
AIA/NDIA STEM Workforce Division Meeting
The primary purpose of our quarterly meetings is to engage in local dialogues about how we can increase the quality of STEM education; the quantity of STEM educated graduates that are eligible for employment in the Aerospace and Defense(A&D) industries; and the amount and effectiveness of engagement by A&D employers, working in partnership with others in their communities. Previous meetings have demonstrated the productiveness of bring...
GovSec Conference & Expo
GovSec, The Government Security Conference and Expo, is joining forces with the Contingency Planning & Management, Network-Centric Security, and U.S. Law Enforcement Conferences. This combination of IT and physical security solutions continues the mission of servicing the needs of government security decision makers from the military, federal civilian agencies and departments, state and local emergency response officials and law enforcemen...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.