Back to Search Begin New Search Save Search Auto-Notify
F5 Gov TechTalk Federal Security Governance
View our on-demand webcast to earn two (ISC)2 CPE credits and discuss how F5 can help enable security, compliance and hardening for today's Federal Government requirements. Learn which standards are necessary to meet the new Federal and DoD requirements, while learning how to enhance application performance, security, and reliability. During this Gov TechTalk, F5 will discuss: How to find hidden threats with SSL Visibility, scale security serv...
November 13, 2015
Organizer: F5 Networks Government Team at Carahsoft
Location: Colorado Springs, CO
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer: SecureAuth
Location: Chicago, IL
Add Favorite
Gatekeeper Training Certification: QPR...
Luzerne County Community College will host a train-the-trainer program on suicide prevention, “QPR Gatekeeper Trainer Certification Course,” through which participants become certified trainers of the industry-leading QPR (Question Persuade Refer) approach to suicide prevention. The training will include an overview of research that led to development of this program, new and promising approaches to suicide prevention, national and...
November 13, 2015
Organizer: Luzerne County Community College
Location: Nanticoke, PA
Add Favorite
SWAT and Critical Incident Management Program
The OpTac International SWAT and Critical Incident Management Program will be held November 12-13, 2015 in Hagerstown, Maryland. An effective law enforcement response to critical incidents involving armed suspects can determine whether someone lives or dies. The OpTac International SWAT and Critical Incident Management Program is based on the book, SWAT Operations and Critical Incidents: Why People Die, written by Stuart A. Meyers, and include...
November 12-13, 2015
Organizer: OpTac International
Location: Hagerstown, MD
Add Favorite
CCISO Training at EC-Council Headquarte...
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance chec...
November 9-13, 2015
Organizer: EC-Council
Location: Albuquerque, NM
Add Favorite
Export Control Reform Transition is End...
Time to Change Your Licenses Export Control Reform (ECR) Transition is coming to an end for certain categories, so it is critical to ensure that you have appropriate EAR licenses in place for items that have transitioned as part of ECR, or that you have updated your ITAR authorizations to specifically incorporate licensing for EAR items under that authorization. This webinar will review the transition timelines, walk through EAR licensing requ...
November 12, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
November 12, 2015
Organizer: 1105 Media Public Sector Events
Location: Webcast
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
TECHEXPO Top Secret Hiring Event Virginia
Security Clearance is REQUIRED to attend this show. TECHEXPO Top Secret cordially invites you to upgrade your career and earn your market worth at our exclusive hiring events for security-cleared professionals. Bring many resumes and interview face-to-face for the hundreds of hot opportunities available in information technology, engineering, aerospace, telecom, cyber security, project management, intelligence, operations, homeland security, r...
November 12, 2015
Organizer: TECHEXPO
Location: McLean, VA
Add Favorite
Leading in the Era of Sequestration
Sequestration and budget constraints have had a profound effect on already-limited federal resources. Agencies face the unenviable task of managing increased workloads with decreased tools. Given this state of fiscal affairs, what can agencies do to contain and diminish the impact of spending cuts and stalemate budgets, while maximizing data to achieve their goals?
November 12, 2015
Organizer: IBM
Location: Webcast
Add Favorite
Back to Search Begin New Search