Back to Search Begin New Search Save Search Auto-Notify
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer: SecureAuth
Location: Chicago, IL
Add Favorite
Gatekeeper Training Certification: QPR...
Luzerne County Community College will host a train-the-trainer program on suicide prevention, “QPR Gatekeeper Trainer Certification Course,” through which participants become certified trainers of the industry-leading QPR (Question Persuade Refer) approach to suicide prevention. The training will include an overview of research that led to development of this program, new and promising approaches to suicide prevention, national and...
November 13, 2015
Organizer: Luzerne County Community College
Location: Nanticoke, PA
Add Favorite
SWAT and Critical Incident Management Program
The OpTac International SWAT and Critical Incident Management Program will be held November 12-13, 2015 in Hagerstown, Maryland. An effective law enforcement response to critical incidents involving armed suspects can determine whether someone lives or dies. The OpTac International SWAT and Critical Incident Management Program is based on the book, SWAT Operations and Critical Incidents: Why People Die, written by Stuart A. Meyers, and include...
November 12-13, 2015
Organizer: OpTac International
Location: Hagerstown, MD
Add Favorite
CCISO Training at EC-Council Headquarte...
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance chec...
November 9-13, 2015
Organizer: EC-Council
Location: Albuquerque, NM
Add Favorite
Export Control Reform Transition is End...
Time to Change Your Licenses Export Control Reform (ECR) Transition is coming to an end for certain categories, so it is critical to ensure that you have appropriate EAR licenses in place for items that have transitioned as part of ECR, or that you have updated your ITAR authorizations to specifically incorporate licensing for EAR items under that authorization. This webinar will review the transition timelines, walk through EAR licensing requ...
November 12, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
November 12, 2015
Organizer: 1105 Media Public Sector Events
Location: Webcast
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
Information Governance Webcast
Manage Your Unmanaged DataAn Automated Approach to Information Governance It's time to take back control of your enterprise data. Organizations with a proliferation of ungoverned SharePoint sites, Exchange servers, and shared drives are typically cluttered with redundant, obsolete, trivial (ROT) information and dark data. The cost to manage ROT and dark data can grow out of control, resulting in additional storage requirements and costs, that...
November 12, 2015
Organizer: HP Government Software at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Leading in the Era of Sequestration
Sequestration and budget constraints have had a profound effect on already-limited federal resources. Agencies face the unenviable task of managing increased workloads with decreased tools. Given this state of fiscal affairs, what can agencies do to contain and diminish the impact of spending cuts and stalemate budgets, while maximizing data to achieve their goals?
November 12, 2015
Organizer: IBM
Location: Webcast
Add Favorite
Trends in Satellite Acquisition: Augmen...
According to the U.S. Government Accountability Office, America faces challenges in providing future space-based capabilities. Fiscal constraints and growing threats to satellites have spurred consideration of alternatives such as disaggregating or breaking up large into multiple, smaller satellites or payloads, and introducing competition into the acquisition of launch services. This webinar will focus on (1) how DOD is improving access acces...
November 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search