Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer:
FEDINSIDER Location:
Webcast
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity The West Acres Shopping Center of Fargo and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosting a...
Cyber Security for Defense
Defending Cyberspace is never an easy task. In fact, it is one of the most difficult duties now facing the United States Military. How do you defend against an enemy, either foreign or homegrown, that can anonymously attack from any direction thereby potentially crippling entire units without firing a single shot? Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attack...
June 24-26, 2015
Organizer:
IDGA Location:
Augusta, GA
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
Contextual Intelligence: Deciphering Di...
Agencies face two primary challenges in knowledge management: Data diversity. Within a given agency, much information resides in relational databases against which the IT shop writes sources such as documents of all types. These may be documents, spreadsheets, presentations; PDFs; or the many other formats such as XML (e.g. NIEM data), maps, electronic messages, Tweets and other social media postings, news items, videos, and images. Institutio...
June 25, 2015
Organizer:
FEDINSIDER Location:
Webcast
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
Encryption and Cybersecurity Export Reg...
BIS relaxes rules while proposing a wide range of new controls on “cybersecurity” products. This webinar will bring companies up to date on the latest regulations affecting exporters of products using encryption as well as discussing new and proposed rules on cyber security products. These new rules are a result of agreements made by the Wassenaar Arrangement in the past two years, as well as an ongoing US interagency review of cyb...
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. Sou...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.