Data Analytics for Action & Impact - Toronto
ABOUT THIS COURSE This two-day course will prepare functional managers and analytic practitioners to finally make sense of data analytics and take control of the analytic process. “Transforming Data to Decisions” develops core skills for data analytics and lays the foundation for data-intensive analytic projects that deliver insight, clarity, confidence and actionable decision support. Attendees will learn the four major types of p...
The 12th Annual Elite SDVOB Network Nat...
The Elite SDVOB Conference promises to bring SDVOBs together wit the corporations and government agencies that believe in the unique value-add our nation's veterans bring to the table. The Elite SDVOB Network has built a national organization that has been able to guide thousands of veterans toward the possibility of achieving the American Dream for which they've sacrificed so much to protect. Join us and connect with SDVOB's specializing in m...
Secure Your Production Environment for...
Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities Before putting containers in production, you should ask yourself three questions: Do you know what’s inside the container you’re going to push to production? What’s your plan to keep vulnerabilities & malware out of the containers? As containers are being downloads or built in-house, is every build, of every container, being checked f...
August 20, 2015
Organizer:
FlawCheck Location:
Webcast
On-Boarding & Retaining New & Experienc...
Hiring federal employees was never an easy process, and so it is especially frustrating to both line managers and HR offices when a new hire might leave after just a year or two. In today’s budget environment, with hard or soft hiring freezes, and early out and buyouts becoming ever more common, it is especially important that once a job offer has been accepted that the hiring manager be able to retain the new hire for a reasonable perio...
CDM: Next Steps Toward Better Security
The Continuous Diagnostics and Mitigation program inaugurated a new era of cybersecurity in government. The goal of the program, which is being rolled out in three phases, is to help agencies systematically improve the security of their networks and systems, providing not only technical guidance but also easy and affordable access to the necessary cybersecurity tools. However, while the overall structure of the program is straightforward, the...
Instructional Series: ITAR Agreements
How to prepare, administer and handle after approval actions for TAAs, MLAs and WDAs. In this installment of our instructional webinar series we will address the most complex US Government export authorization, the Department of State’s agreements, including Technical Assist Agreements (TAA), Manufacturing License Agreement (MLA) and the Warehouse and Distribution Agreement (WDA). If you are exporting technical data or providing a defens...
Maritime Security 2015 West
Maritime Security 2015 West is the third installment of the Maritime Security West program series, building upon the successes of last year’s conference in Tacoma, WA. As the thirteenth maritime security conference hosted by Homeland Security Outlook since 2011, Maritime Security 2015 West furthers a commitment to address the needs of governments, law enforcement, and critical infrastructure to counter the challenges of securing coastlin...
25th Annual Government Financial Manage...
Welcome to the 25th Annual Government Financial Management Conference at the Ronald Reagan Building and International Trade Center in Washington, D.C. This three-day training event, sponsored by the Department of the Treasury’s Bureau of the Fiscal Service, will allow you to earn up to 21 continuing professional education (CPE) credits. From a selection of 55 educational sessions, you will learn about the latest developments in governmen...
A Studied Look at Federal Networks and...
In a world of shrinking budgets and unparalleled growth in data, agency network infrastructures that were put in place 20 years ago are inadequate to meet today’s demands. The New IP represents a change in the network from a physical to a virtual entity, and prepares public sector IT environments for the future. Using timely research conducted by surveying government technology leaders coupled with public sector insights, this session wi...
August 18, 2015
Organizer:
FEDINSIDER Location:
Webcast
SANS Cyber Defense Summit & Training -...
Prevent. Detect. Respond.The mission of SANS' Cyber Defense curriculum, led by Dr. Eric Cole, is to teach individuals the essential skills and techniques needed to protect and secure an organization's critical information assets and business systems.Now, for the first time, cyber defense practitioners will come together for a two-day Summit to share real-life success stories, best practices, and tips that are immediately actionable. Attendees...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.