What Does a Best-in-Class State ...
Whether you’re tasked with securing student data for a small rural college, or you are the State CIO concerned about everything from securing your critical infrastructure to protecting citizens’ ID, you have an immense job at hand… And if you don’t think you’ve experienced a breach, you may be surprised at what you’d find if you had a better view. Don’t miss this session and our powerful line-up of pa...
Where Cloud Computing Meets Mission: Ma...
In the coming fiscal year, the White House expects the federal government to spend some $7.5 billion on provisioned services like cloud computing. Four years removed from the unveiling of the Cloud First strategy, the question today isn’t whether agencies will transition services and critical systems to cloud, it’s when. Maximizing investment in the cloud requires a strategy that factors in risk, security, cost, agility and a hard...
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
Turning Data into Intelligence in Government
Government agencies are flooded with a tsunami of data delivered in multiple electronic formats, whether that is PDFs, spreadsheets, documents, maps or even social media. Agencies are tasked with using that data to fulfill their mission, cost-effectively and securely. This webinar will look at how agencies are managing data to deliver knowledge in context. Learning Objectives: Understand strategic approaches agencies are using to conform to th...
July 21, 2015
Organizer:
FEDINSIDER Location:
Webcast
TakeDownCon Rocket City Hacking and IT...
TakeDownCon, Hacking and IT Security Conference, a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most...
July 20-21, 2015
Organizer:
EC-Council Location:
Huntsville, AL
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity Westfield Topanga Canyon Mall and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosting a one-day Se...
SWAT Tactics Program
The OpTac International SWAT Tactics Program will be held July 16-17, 2015 in Hagerstown, Maryland. This program tactically prepares law enforcement commanders, team leaders, and SWAT/police personnel for situations that they are likely to encounter on a wide array of high-risk operations. An emphasis is placed on dynamic entry tactics, advantages and disadvantages of ballistic shields, injured officer/citizen rescue, officer safety, and prope...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
FCPA Compliance – The Devil Is in the D...
The potential opportunities and financial rewards associated with expansion into new foreign markets can seem limitless. However, jumping into the global marketplace also brings with it new challenges and pitfalls that extend well beyond compliance with export and import clearance formalities. As corruption in international business is commonplace and even rampant in many parts of the world, the Foreign Corrupt Practices Act (“FCPA...
Vulnerability Assessment/Risk Analysis...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & R3SME [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerou...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.