Back to Search Begin New Search Save Search Auto-Notify
What Does a Best-in-Class State ...
Whether you’re tasked with securing student data for a small rural college, or you are the State CIO concerned about everything from securing your critical infrastructure to protecting citizens’ ID, you have an immense job at hand… And if you don’t think you’ve experienced a breach, you may be surprised at what you’d find if you had a better view. Don’t miss this session and our powerful line-up of pa...
July 21, 2015
Organizer: 1105 Media Public Sector Events
Location: Webcast
Add Favorite
Where Cloud Computing Meets Mission: Ma...
In the coming fiscal year, the White House expects the federal government to spend some $7.5 billion on provisioned services like cloud computing. Four years removed from the unveiling of the Cloud First strategy, the question today isn’t whether agencies will transition services and critical systems to cloud, it’s when. Maximizing investment in the cloud requires a strategy that factors in risk, security, cost, agility and a hard...
July 21, 2015
Organizer: Government Executive Media Group
Location: Washington, DC
Add Favorite
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Turning Data into Intelligence in Government
Government agencies are flooded with a tsunami of data delivered in multiple electronic formats, whether that is PDFs, spreadsheets, documents, maps or even social media. Agencies are tasked with using that data to fulfill their mission, cost-effectively and securely. This webinar will look at how agencies are managing data to deliver knowledge in context. Learning Objectives: Understand strategic approaches agencies are using to conform to th...
July 21, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
TakeDownCon Rocket City Hacking and IT...
TakeDownCon, Hacking and IT Security Conference, a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most...
July 20-21, 2015
Organizer: EC-Council
Location: Huntsville, AL
Add Favorite
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity Westfield Topanga Canyon Mall and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosting a one-day Se...
July 17, 2015
Organizer: Department of Homeland Security
Location: Canoga Park, CA
Add Favorite
SWAT Tactics Program
The OpTac International SWAT Tactics Program will be held July 16-17, 2015 in Hagerstown, Maryland. This program tactically prepares law enforcement commanders, team leaders, and SWAT/police personnel for situations that they are likely to encounter on a wide array of high-risk operations. An emphasis is placed on dynamic entry tactics, advantages and disadvantages of ballistic shields, injured officer/citizen rescue, officer safety, and prope...
July 16-17, 2015
Organizer: OpTac International
Location: Hagerstown, MD
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
July 13-17, 2015
Organizer: American Management Association
Location: San Francisco, CA
Add Favorite
FCPA Compliance – The Devil Is in the D...
The potential opportunities and financial rewards associated with expansion into new foreign markets can seem limitless. However, jumping into the global marketplace also brings with it new challenges and pitfalls that extend well beyond compliance with export and import clearance formalities. As corruption in international business is commonplace and even rampant in many parts of the world, the Foreign Corrupt Practices Act (“FCPA...
July 16, 2015
Organizer: Export Compliance Training Institute
Location: Virtual
Add Favorite
Vulnerability Assessment/Risk Analysis...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & R3SME [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerou...
July 14-16, 2015
Organizer: Haines Security Solutions
Location: Oxnard, CA
Add Favorite
Back to Search Begin New Search