Back to Search Begin New Search Save Search Auto-Notify
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
AFCEA Homeland Security Conference 2015
More than any other operations, homeland security missions call for coordinated and end-to-end collaboration. Success depends on preparing for the unknowable, preventing the unthinkable and planning recovery from the unimaginable. To assist in the process, AFCEA International brings together the people in charge of ensuring success—from subject matter experts to frontline responders—for two days of open discussion about the variou...
March 10-11, 2015
Organizer: AFCEA International
Location: Washington, DC
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
DevOps and the Business of Government:...
Federal agencies have been charged with the use of agile technologies to jumpstart technology innovation with lower risk. From the health care systems to networks supporting war fighters in the field, agencies are looking to agile technology tools to curb costs while remaining responsive in the face of rapidly changing technology. The White House’s Office of Management and Budget recently kicked off compliance with this mandate with its...
January 28, 2015
Organizer: FEDINSIDER
Location: Virtual
Add Favorite
Transformative Technologies: Cloud, Big...
COMPLIMENTARY BRIEFING
October 8, 2014
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Mitigating Insider Threats in Virtual ...
A major research study by International Data Corporation on key trends in cloud computing reveals that 67% of IT professionals consider security their #1 barrier to migrating to the cloud. These concerns go well beyond internal network security and include access by unauthorized devices and threats from malicious insiders as well as employee error and gaps in protection. This webinar will explore methods to safely and securely virtualize, migr...
September 23, 2014
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Security Awareness Summit 2014
What Will You Learn- Strategies and techniques other organizations are using that actively engage their employees and staff- Habits of highly effective security awareness programs- Top human risks- What communication methods are the most effective- What other organizations are doing to effectively measure change in behavior- How organizations are making the most use of their limited resourcesWho Should Attend?This summit is for people that alr...
September 8-17, 2014
Organizer: SANS Institute
Location: Dallas, TX
Add Favorite
Continuous Monitoring – Continuous Diag...
Overview of the Workshop: Information systems security is considered one of the top priorities for most CIOs and agency heads. There are many pieces to security management, compliance and reporting requirements. With FISMA requirements, OMB requirements/DHS reporting requirements and NIST special guidance and standards (which are mandatory for compliance), many executives, managers and staff often have questions about what to do, how to compl...
August 27, 2014
Organizer: Potomac Forum, Ltd
Location: Washington, DC
Add Favorite
Cyber Defense Summit 2014
Cyber Defense SummitChairman: Dr. Eric Cole CPE Credits: 16Pre-Summit Course Dates: August 13 - August 18, 2014Summit Dates: August 19-20, 2014Prevent. Detect. Respond.The mission of SANS' Cyber Defense curriculum, led by Dr. Eric Cole, is to teach individuals the essential skills and techniques needed to protect and secure an organization's critical information assets and business systems. http://www.sans.org/info/156480Now, for the first tim...
August 19-20, 2014
Organizer: SANS Institute
Location: Nashville, TN
Add Favorite
Cyber Security Brainstorm
Join MeriTalk’s Cyber Security Exchange for the second annual Cyber Security Brainstorm on Wednesday, June 18, 2014 at the at the Knight Conference Center at the Newseum in Washington, D.C. The event will bring together savvy Federal cyber security experts to share best practices, collaborate on challenges, and discuss what is needed for the future of cyber security. More details coming soon. For more information, contact Lisa Futterman...
June 18, 2014
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Back to Search Begin New Search