Back to Search Begin New Search Save Search Auto-Notify
The Mandate for Public Sector Enterpris...
Agencies are increasingly asking themselves, “What are the risks that could prevent my agency from achieving its mission and objectives?” At one time, it was enough to focus on departmental risks such as financial or operational risks for federal financial programs or acquisition and investment risks for departments and agencies that rely heavily on procurement of major systems and other support for the agency’s mission. In t...
June 30, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Application Security Imperatives: Where...
How are agencies providing the anywhere, anytime access to data while still safeguarding information? Government legacy applications may permit clandestine access to exfiltrate data and explose personally identifiable information or other vital information to hackers. Demands for secure access along with a quality user experience mandates that the IT staff, the networking team, and the program managers work together. This webinar will feature...
June 29, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
June 22-27, 2015
Organizer: SANS Institute
Location: Denver, CO
Add Favorite
DHS Active Shooter Preparedness Worksho...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity The West Acres Shopping Center of Fargo and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security is hosting a...
June 26, 2015
Organizer: Department of Homeland Security
Location: Fargo, ND
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level II. Moving beyond the basics covered in COR Level I Training, this hands-on, interactive 5-day course builds on your experience, deepens your understanding of the acquisition process, and takes your skills and capabilities to the next level. It is taught by train...
June 22-26, 2015
Organizer: American Management Association
Location: Dallas, TX
Add Favorite
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
June 25, 2015
Organizer: American Management Association
Location: Arlington, VA
Add Favorite
Contextual Intelligence: Deciphering Di...
Agencies face two primary challenges in knowledge management: Data diversity. Within a given agency, much information resides in relational databases against which the IT shop writes sources such as documents of all types. These may be documents, spreadsheets, presentations; PDFs; or the many other formats such as XML (e.g. NIEM data), maps, electronic messages, Tweets and other social media postings, news items, videos, and images. Institutio...
June 25, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
June 25, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Encryption and Cybersecurity Export Reg...
BIS relaxes rules while proposing a wide range of new controls on “cybersecurity” products. This webinar will bring companies up to date on the latest regulations affecting exporters of products using encryption as well as discussing new and proposed rules on cyber security products. These new rules are a result of agreements made by the Wassenaar Arrangement in the past two years, as well as an ongoing US interagency review of cyb...
June 25, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. Sou...
June 23-25, 2015
Organizer: Torch Marketing Co Ltd
Location: Bangkok, TH
Add Favorite
Back to Search Begin New Search