Executive Briefing: Plans, Needs ...
Learn about the plans, needs and challenges for DHS and what they mean to the small business sector.The Panel:Richard A. Spires serves as the Chief Information Officer (CIO) of the Department of Homeland Security (DHS). He is responsible for the department’s $6.8 billion investment in Information Technology (IT).Kevin Boshears was named Director of the Department of Homeland Security’s Office of Small and Disadvantaged Business Uti...
May 15, 2012
Organizer:
SECAF Location:
Vienna, VA
Big Data - Implications and Opportuniti...
The tsunami of information known as “Big Data” is here. How will your organization address growing data requirements and implement critical strategies and technologies necessary to manage and evaluate your data? Join 1105 Media and Cisco as they facilitate an interactive video panel discussion with Big Data experts from government and industry who will examine emerging trends, technologies and solutions for the “data deluge...
Capture and Proposal Management Training
Capture Management on May 8 Proposal Management on May 9 Hilton Garden Inn - Tysons Corner Virginia "The best capture and proposal classes you can take - Listen to our attendees" I loved the common sense approach and ease of following our leader. Great take a-ways for us! Thank you!" Karen T. Farren Director, Tactical Logistics/Combat Development Joint Logistics Managers, Inc. "The instructor was outstanding, as were the materials. Well worth...
11th Annual Naval IT Day
AFCEA NOVA is proud to host the information packed 11th Annual Naval IT Day, a “must attend” conference for anyone interested in doing IT business with the Navy. This dynamic and high-powered conference will highlight major technology initiatives underway across the Naval enterprise using the latest advances in cyber security, cloud computing, virtualization, and data center consolidations. Leaders will discuss enterprise-wide IT r...
May 3, 2012
Organizer:
AFCEA NOVA Location:
Vienna, VA
Security Clearance Expo April Virginia...
Security Clearance Expo Thursday, April 19, 2012Sheraton Premiere At Tyson's Corner8661 Leesburg Pike Vienna, Virginia 22182 10:00:00 AM - 3:00:00 PM April's Most Exclusive Hiring Events Spring to a New Career. Interview Face to Face With The Areas Top Companies For 1000's Fully Funded Cleared Career Opportunities At SecurityClearanceEXPO's Hiring Events Thursday, April 19th, 2012 Sheraton Premiere at Tyson's Corner 8661 Leesburg Pike Vienna,...
Executive Briefing: Taking the Guesswor...
Featuring Joanie F. Newhart, CPCM, Associate Administrator for Acquisition Workforce Programs, Office of Federal Procurement Policy (OFPP) and Rob Burton, Partner, Venable LLP.
April 19, 2012
Organizer:
SECAF Location:
Vienna, VA
GSA's MAS Program & the False Claims Act
The panelists will walk through the lifecycle of a mock Civil False Claims Act case involving the GSA Schedules. The forum will provide an opportunity for an interactive discussion with defense counsel, relators’ counsel and government counsel. Event is perfect for: In-house Counsel Compliance Managers Government Contracting Officers Inspector General Accountants Ethics Officers
4th Annual Federal Media Study Breakfast
Knowing where and how to reach senior decision-makers at civilian and defense agencies is a vital component to every marketing effort aimed at the federal government. Market Connections and Sara Leiman, VP Media Director at TMP Government, are excited to announce the release of this year’s Federal Media and Marketing Study. The 4th installment of this popular syndicated study combines actual media usage of mid to senior-level federal dec...
Understanding FedRAMP: Creating a Cloud...
Understanding FedRAMP, Creating a Cloud Security Roadmap is a one-day in-depth educational program for Government Executives, Managers, Program Managers and Staff & Industry Partners. Workshop Description:In November 2010 GSA with support from Dept of Homeland Security and Dept of Defense established the Federal Risk and Authorization Management Program (FedRAMP) as the standard approach to Assessing and Authorizing cloud computing securit...
The Anatomy of an Enterprise Cyber Attack
In 2009, Chinese hackers began stealing sensitive intellectual property from U.S. oil, gas and petrochemical companies. The attacks were attributed to the Chinese based on recognition of Chinese hacking tools previously identified on underground hacking sites and the attacks apparent origin in Beijing. Termed “Night Dragon,” these attacks included social engineering, spear-phishing attacks, exploitation of Microsoft Windows OS vuln...
April 11, 2012
Organizer:
NVTC Location:
Vienna, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.