F5 Gov TechTalk Federal Security Governance
View our on-demand webcast to earn two (ISC)2 CPE credits and discuss how F5 can help enable security, compliance and hardening for today's Federal Government requirements. Learn which standards are necessary to meet the new Federal and DoD requirements, while learning how to enhance application performance, security, and reliability. During this Gov TechTalk, F5 will discuss: How to find hidden threats with SSL Visibility, scale security serv...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer:
SecureAuth Location:
Chicago, IL
Gatekeeper Training Certification: QPR...
Luzerne County Community College will host a train-the-trainer program on suicide prevention, “QPR Gatekeeper Trainer Certification Course,” through which participants become certified trainers of the industry-leading QPR (Question Persuade Refer) approach to suicide prevention. The training will include an overview of research that led to development of this program, new and promising approaches to suicide prevention, national and...
SWAT and Critical Incident Management Program
The OpTac International SWAT and Critical Incident Management Program will be held November 12-13, 2015 in Hagerstown, Maryland. An effective law enforcement response to critical incidents involving armed suspects can determine whether someone lives or dies. The OpTac International SWAT and Critical Incident Management Program is based on the book, SWAT Operations and Critical Incidents: Why People Die, written by Stuart A. Meyers, and include...
CCISO Training at EC-Council Headquarte...
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance chec...
November 9-13, 2015
Organizer:
EC-Council Location:
Albuquerque, NM
Export Control Reform Transition is End...
Time to Change Your Licenses Export Control Reform (ECR) Transition is coming to an end for certain categories, so it is critical to ensure that you have appropriate EAR licenses in place for items that have transitioned as part of ECR, or that you have updated your ITAR authorizations to specifically incorporate licensing for EAR items under that authorization. This webinar will review the transition timelines, walk through EAR licensing requ...
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer:
SecureAuth Location:
Costa Mesa, CA
TECHEXPO Top Secret Hiring Event Virginia
Security Clearance is REQUIRED to attend this show. TECHEXPO Top Secret cordially invites you to upgrade your career and earn your market worth at our exclusive hiring events for security-cleared professionals. Bring many resumes and interview face-to-face for the hundreds of hot opportunities available in information technology, engineering, aerospace, telecom, cyber security, project management, intelligence, operations, homeland security, r...
November 12, 2015
Organizer:
TECHEXPO Location:
McLean, VA
Leading in the Era of Sequestration
Sequestration and budget constraints have had a profound effect on already-limited federal resources. Agencies face the unenviable task of managing increased workloads with decreased tools. Given this state of fiscal affairs, what can agencies do to contain and diminish the impact of spending cuts and stalemate budgets, while maximizing data to achieve their goals?
November 12, 2015
Organizer:
IBM Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.