Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer:
SecureAuth Location:
Chicago, IL
Gatekeeper Training Certification: QPR...
Luzerne County Community College will host a train-the-trainer program on suicide prevention, “QPR Gatekeeper Trainer Certification Course,” through which participants become certified trainers of the industry-leading QPR (Question Persuade Refer) approach to suicide prevention. The training will include an overview of research that led to development of this program, new and promising approaches to suicide prevention, national and...
SWAT and Critical Incident Management Program
The OpTac International SWAT and Critical Incident Management Program will be held November 12-13, 2015 in Hagerstown, Maryland. An effective law enforcement response to critical incidents involving armed suspects can determine whether someone lives or dies. The OpTac International SWAT and Critical Incident Management Program is based on the book, SWAT Operations and Critical Incidents: Why People Die, written by Stuart A. Meyers, and include...
CCISO Training at EC-Council Headquarte...
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance chec...
November 9-13, 2015
Organizer:
EC-Council Location:
Albuquerque, NM
Export Control Reform Transition is End...
Time to Change Your Licenses Export Control Reform (ECR) Transition is coming to an end for certain categories, so it is critical to ensure that you have appropriate EAR licenses in place for items that have transitioned as part of ECR, or that you have updated your ITAR authorizations to specifically incorporate licensing for EAR items under that authorization. This webinar will review the transition timelines, walk through EAR licensing requ...
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer:
SecureAuth Location:
Costa Mesa, CA
Information Governance Webcast
Manage Your Unmanaged DataAn Automated Approach to Information Governance It's time to take back control of your enterprise data. Organizations with a proliferation of ungoverned SharePoint sites, Exchange servers, and shared drives are typically cluttered with redundant, obsolete, trivial (ROT) information and dark data. The cost to manage ROT and dark data can grow out of control, resulting in additional storage requirements and costs, that...
Leading in the Era of Sequestration
Sequestration and budget constraints have had a profound effect on already-limited federal resources. Agencies face the unenviable task of managing increased workloads with decreased tools. Given this state of fiscal affairs, what can agencies do to contain and diminish the impact of spending cuts and stalemate budgets, while maximizing data to achieve their goals?
November 12, 2015
Organizer:
IBM Location:
Webcast
Trends in Satellite Acquisition: Augmen...
According to the U.S. Government Accountability Office, America faces challenges in providing future space-based capabilities. Fiscal constraints and growing threats to satellites have spurred consideration of alternatives such as disaggregating or breaking up large into multiple, smaller satellites or payloads, and introducing competition into the acquisition of launch services. This webinar will focus on (1) how DOD is improving access acces...
November 12, 2015
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.