Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer:
SecureAuth Location:
New York, NY
Cyber Warfare and Security for the DoD:...
View the fifth Digital Collaboration Conference on-demand webcast, Cyber Warfare and Security for the DoD: The Experts Forum, on November 4th, live, online to learn more about cyber warfare, how it's affecting day-to-day operations, and how leaders in the cyber space are working to combat it. This digital conference is bringing together cyber experts who will share insights and technologies from industry trends, their published works, and the...
SINET Showcase
SINET Showcase provides a platform for the business of Cybersecurity to take place. We connect innovative early stage and emerging growth Cybersecurity solution providers with system integration, private industry and Federal Government markets, including the civilian, military and intelligence communities. Our goal is to highlight global entrepreneurs by increasing their product awareness for a select audience of venture capitalists, investmen...
Building an Industry Example: ChatOps w...
Government organizations that really understand Agile and DevOps are implementing a new approach to enable teams to seamlessly communicate activity and actions taken in IT environments. While this may seem too futuristic to be easily attainable in a Government IT organization, the combination of GitHub Enterprise and Ansible Tower will enable your organization to realize many benefits as you build your capabilities toward the fully-enabled Dev...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer:
SecureAuth Location:
Boston, MA
Managing School Safety in the 21st Century
The US is home to more than 130,000 schools serving approximately 55 million K-12 students, and another 4,500-plus colleges and universities serving 21 million students. While the vast majority of campuses offer safe, secure environments, no school is immune to threats and risks. Students, parents, and communities expect their educational leaders to work with local law enforcement and public safety agencies in preparing for a wide array of man...
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity University of Nebraska at Kearney, Office of Emergency Management and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homel...
Growing Your State and Local Government...
In just the last quarter alone, more than $114 million was awarded through the California Multiple Award Schedule (CMAS) contract. As a GSA Schedule holder, you may be automatically eligible for this open enrollment contract. Winvale’s team of procurement and sales experts can help you acquire and take advantage of this growing contract vehicle! As Winvale holds its own CMAS contract, we can help you navigate this lucrative State contrac...
October 30, 2015
Organizer:
Winvale Location:
Webcast
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.