Back to Search Begin New Search Save Search Auto-Notify
Gatekeeper Training Certification: QPR...
Luzerne County Community College will host a train-the-trainer program on suicide prevention, “QPR Gatekeeper Trainer Certification Course,” through which participants become certified trainers of the industry-leading QPR (Question Persuade Refer) approach to suicide prevention. The training will include an overview of research that led to development of this program, new and promising approaches to suicide prevention, national and...
November 13, 2015
Organizer: Luzerne County Community College
Location: Nanticoke, PA
Add Favorite
SWAT and Critical Incident Management Program
The OpTac International SWAT and Critical Incident Management Program will be held November 12-13, 2015 in Hagerstown, Maryland. An effective law enforcement response to critical incidents involving armed suspects can determine whether someone lives or dies. The OpTac International SWAT and Critical Incident Management Program is based on the book, SWAT Operations and Critical Incidents: Why People Die, written by Stuart A. Meyers, and include...
November 12-13, 2015
Organizer: OpTac International
Location: Hagerstown, MD
Add Favorite
CCISO Training at EC-Council Headquarte...
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance chec...
November 9-13, 2015
Organizer: EC-Council
Location: Albuquerque, NM
Add Favorite
Endangered Species Act Update
Make sure that you are up-to-date on the latest issues with the Endangered Species Act. The federal Endangered Species Act (ESA) is one of the most important, powerful and far-reaching of our modern environmental laws. Early identification, analysis and resolution of ESA issues is a key part in any environmental practice. In the development context, ESA issues are often a key component in determining whether, when or how a development project...
November 12, 2015
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
Export Control Reform Transition is End...
Time to Change Your Licenses Export Control Reform (ECR) Transition is coming to an end for certain categories, so it is critical to ensure that you have appropriate EAR licenses in place for items that have transitioned as part of ECR, or that you have updated your ITAR authorizations to specifically incorporate licensing for EAR items under that authorization. This webinar will review the transition timelines, walk through EAR licensing requ...
November 12, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
November 12, 2015
Organizer: 1105 Media Public Sector Events
Location: Webcast
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
How To DOUBLE Throughput On Existing Sy...
View our on-demand webcast as we outline the anatomy of an I/O in virtualized environments and explain why your systems under heavy workloads are only processing HALF the throughput they should from VM to storage due to TWO BIG INEFFICIENCIES. This educational webinar on I/O performance is perfect for anyone administering servers, virtualization, and/or storage. How To DOUBLE Throughput On Existing Systems Understand the I/O tax in a virtual e...
November 12, 2015
Organizer: Condusiv Government Team at Carahsoft
Location: Webcast
Add Favorite
Information Governance Webcast
Manage Your Unmanaged DataAn Automated Approach to Information Governance It's time to take back control of your enterprise data. Organizations with a proliferation of ungoverned SharePoint sites, Exchange servers, and shared drives are typically cluttered with redundant, obsolete, trivial (ROT) information and dark data. The cost to manage ROT and dark data can grow out of control, resulting in additional storage requirements and costs, that...
November 12, 2015
Organizer: HP Government Software at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Leading in the Era of Sequestration
Sequestration and budget constraints have had a profound effect on already-limited federal resources. Agencies face the unenviable task of managing increased workloads with decreased tools. Given this state of fiscal affairs, what can agencies do to contain and diminish the impact of spending cuts and stalemate budgets, while maximizing data to achieve their goals?
November 12, 2015
Organizer: IBM
Location: Webcast
Add Favorite
Back to Search Begin New Search