Back to Search Begin New Search Save Search Auto-Notify
E-Signature Summit for Digital Government
All levels and branches of government are under pressure to lower cost, improve service delivery and strengthen accountability – goals that are seemingly at odds. Luckily e-signatures deliver on all these fronts. Join e-SignLive for this intimate half-day summit that will reveal how electronic signatures are supporting today’s digital government strategies around mobility, the cloud and cyber security. Ideal for senior IT and progr...
April 29, 2015
Organizer: e-Sign Live by Silanis
Location: Washington, DC
Add Favorite
Straight Talk featuring Patricia Culbre...
Join the ACT-IAC Small Business Alliance on April 29th for Straight Talk with Trish Culbreth the Deputy Director of the Office of Small Business Programs at the Defense Logistics Agency. This session will focus on the importance of small business to the agency and how the agency plans to engage its small business partners. The Defense Logistics Agency is the Department of Defense's largest combat support agency and is responsible for nearly ev...
April 29, 2015
Organizer: ACT-IAC
Location: Falls Church, VA
Add Favorite
Privacy, Cybersecurity and Social Media
A discussion on privacy and how it is evolving with social media such as Facebook, Twitter and LinkedIn. We will discuss the differences between how this is being handled domestically in the United States versus the international views of other countries on privacy.
April 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
GITEC Summit 2015
GITEC Summit 2015: Innovate, Secure and Deliver Government Solutions Register now and reserve your complimentary government registration! Industry registrations are also available for purchase on our website. The GITEC Summit is the 2015 “must attend” conference for anyone working in public sector IT solutions. If you are an IT leader in the government, industry or academia, the Summit is the premier forum to share ideas, challenge...
April 26-28, 2015
Organizer: GITEC - The Government IT Executive Council
Location: Baltimore, MD
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
April 20-24, 2015
Organizer: American Management Association
Location: Arlington, VA
Add Favorite
Professionalization and the Cybersecuri...
The increasing frequency and scale of reported cyber attacks, highlights the need for a cybersecurity workforce of sufficient size and quality to meet the evolving threat environment. To address this need, some cybersecurity experts call for enhanced professionalization requirements. Certification, licensure, skill-based competency exams, and a national association all have been advanced as components of a comprehensive workforce strategy to a...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
2015 North American IPv6 Conference
Two-day general session on IPv6 with a variety of speakers. Access to the Virtual Trade Show, playback of sessions, access to marketing materials and sponsor engagement through August, 2015. Learn about the benefits of using IPv6 from experts Gain valuable information to prepare you and your organization for this new wave of Internet innovation Lunch and refreshments provided Optional: One entire day of pre-conference tutorials (for an additio...
April 22-23, 2015
Organizer: RMv6TF
Location: Greenwood Village, CO
Add Favorite
USGIF Dayton Technical Workshop
Demands, Challenges, and Opportunities for Technical Intelligence in an Anti-Access/Area Denial (A2AD) EnvironmentWright-Patterson Air Force Base, Dayton, Ohio The United States Geospatial Intelligence Foundation (USGIF) invites you to spend two days at the National Air and Space Intelligence Center (NASIC) with an optional half-day at the Air Force Research Lab (AFRL) to learn more about the unique and critical work taking place in Dayton. Th...
April 21-23, 2015
Organizer: USGIF
Location: Dayton, OH
Add Favorite
Back to Search Begin New Search