Cybercrime Trends and Scenarios � What...
Cyberattacks continue to evolve and plague the global economy. What was once an annoyance and something financial institutions needed to worry about has now morphed into a worldwide epidemic of attacks, breaches of personal information, financial loss to consumers, and personal accountability placed on company executives and boards of directors. At the same time, there are dozens of companies that purport to “solve” the security pr...
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Privacy, Cybersecurity and Social Media
A discussion on privacy and how it is evolving with social media such as Facebook, Twitter and LinkedIn. We will discuss the differences between how this is being handled domestically in the United States versus the international views of other countries on privacy.
Professionalization and the Cybersecuri...
The increasing frequency and scale of reported cyber attacks, highlights the need for a cybersecurity workforce of sufficient size and quality to meet the evolving threat environment. To address this need, some cybersecurity experts call for enhanced professionalization requirements. Certification, licensure, skill-based competency exams, and a national association all have been advanced as components of a comprehensive workforce strategy to a...
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
OHSA Update � What You Need To Know
OSHA Update - What You Need To Know You're Invited - Richmond, VA 3/11/15 J. J. Keller Safety Management Education Seminar Join J. J. Keller experts Sr. Workplace Safety Editor, Travis Rhoden, and Account Executive, Jeff Jordan, at this complimentary seminar as they provide an executive overview on the latest OSHA regulatory changes! Updates include the new GHS labeling standards, Hazcom, Injury & Illness prevention (I2P2), record-keeping...
Hours of Service & Vehicle Compliance Update
Hours of Service & Vehicle Compliance Richmond, VA 3/10/15 - J. J. Keller Safety Education Seminar You're cordially invited to join J. J. Keller for a no-cost informative seminar on the Hours of Service regulations including changes to the 34 restart, MAP-21 Transportation Bill, the latest news on the ELD proposal and pending mandate,CSA impact on driver fatigue scores, SMS changes, electronic logs, vehicle compliance & inspection requ...
NASA Glenn Research Center Technology Expo
Join NCSI for an In-Agency Event NASA Glenn Research Center Technology Expo March 3, 2015 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.