Aircraft Accident Investigation
This course provides participants with a comprehensive overview of the procedures and methods used and the skills required to investigate an aircraft accident. Examples from recent NTSB investigations will be used to demonstrate particular aspects of the investigative process. Overview Site documentation and management Operational and mechanical aspects of aircraft performance Turbine and reciprocating engines Fire and explosions Fracture reco...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Managing Government Records Training Wo...
Overview: With the current headlines regarding government email retention and e-discovery, it is important This one-day Potomac Forum Workshop will focus on the activities mandated by the NARA/OMB Records Management Directive. Key executives from NARA and government agencies will discuss the directive and its implementation. Detailed review and analysis of the directive will be presented to help agencies better understand what they need to do...
Accelerate Training with Social Learnin...
Every government agency faces the need to train and enable its workforce. Doing this effectively is a challenge because so much of the expertise resides with its people rather than in structured learning courses. Knowledge needs to flow horizontally across peers; not just vertically. Yet most social knowledge transfer today gets lost in emails, instant messages or conversations around the water cooler. During this session, you’ll learn h...
September 24, 2015
Organizer:
FedInsider Location:
Webcast
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity The Jewish Community Center of San Francisco and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosti...
Chicago EAR Export Controls / ITAR Defe...
Chicago 2015 CLICK HERE FOR FULL SCHEDULE OF SEMINARS SEMINAR SERIES in Chicago ILLINOIS SEPT 2015 ECTI INSTRUCTORS John Black Greg Creeser Scott Gearity Stephen Wagner Jonathan Poling EAR Export Controls / ITAR Defense Trade Controls Seminar Series at the Hilton Chicago Magnificent Mile Suites 198 East Delaware Place Chicago, IL 60611 USA REGISTER NOW DOWNLOAD SEMINAR BROCHURE EAR & OFAC Controls SEMINAR SEMINAR AGENDA ECoP® EAR rene...
Data Mining: Failure to Launch
How to Get Data Mining Off the Ground and Into OrbitA Free One-Hour Live, Interactive Web EventProduced by The Modeling Agency“Guidance & Results for the Data-Rich, Yet Information-Poor”Presented by TMA Senior Consulting Staffhttp://www.the-modeling-agency.com/data-mining-webinarWHAT'S COVEREDThe vast majority of BI professionals are excited about the prospects of data mining and predictive analytics, but are fully mystified ab...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
MeriTalk Cyber Security Brainstorm
Join MeriTalk's Cyber Security Exchange for the fourth annual Cyber Security Brainstorm on Wednesday, September 23, 2015 at the Knight Conference Center at the Newseum in Washington, D.C. From insider threats to legacy security gaps to financial crimes and everything in between – it's no longer "if", but "when" in the government cyber incident arena. Government and partners across industry and academia are looking to improve collective c...
September 23, 2015
Organizer:
MeriTalk Location:
Washington, DC
Face-to-Face DOD: The Path to JIE (and...
The Joint Information Environment represents a bold, new effort to ensure that military commanders, warfighters, and other DOD personnel and partners can share information and collaborate securely and effectively. The initiative will support the development of a converged infrastructure that supports DOD users wherever they are and whatever devices they are using. JIE also has big implications for security, with DOD aiming to create a single s...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.