Back to Search Begin New Search Save Search Auto-Notify
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer: EC-Council
Location: Greenbelt, MD
Add Favorite
Predictive Analytics & Data Mining Cour...
LEARN WHAT MANAGERS & PRACTITIONERS REALLY NEEDTO KNOW ABOUT PREDICTIVE ANALYTICS & DATA MINING Get up to speed in data mining faster and more effectively than with any other training program available. Leverage highly valuable and impactful prospective insight from within your existing data through an intensive course series with over 20 years of innovation.If you want to learn what really works in predictive modeling and why you shou...
March 2-6, 2015
Organizer: The Modeling Agency
Location: Orlando, FL
Add Favorite
Personal Liability & Penalties for Expo...
Export Enforcement Gets Personal: The US Government is already penalizing employees. Until recently, executives and employees were generally protected from personal liability for civil penalties in export enforcement cases. Then came the case ofUnited States v. Trek Leather, Inc., in which Federal courts ruled that corporate officials may be held personally liable for regulatory violations even without the government “piercing the corpor...
March 5, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
Critical Infrastructure Protection ...
Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The...
March 3-5, 2015
Organizer: Torch Marketing Co Ltd
Location: The Hague, NL
Add Favorite
Security Criteria Development
This workshop focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also...
March 3-5, 2015
Organizer: Haines Security Solutions
Location: Oxnard, CA
Add Favorite
Introduction to Unmanned Aircraft Syste...
Introduction to Unmanned Aircraft Systems (UAS)Wednesday, March 4, 2015 | 1:00-4:00 EST (6:00-9:00 UTC)LIVE Online Webcourse | Classification: Unclassified Course Description: The Congressionally mandated 2015 deadline for integration of UAS into the National Air Space, coupled with the recent selection of the first six FAA UAS test site operators, has significantly increased interest in the ability to build and test both new types of UAS and...
March 4, 2015
Organizer: Association of Old Crows
Location: Webcast
Add Favorite
Active Shooter Preparedness Workshop -...
THIS IS NOT A TACTICAL TRAINING COURSE Given today's ever-changing threat environment, preparing for and training employees to cope with workplace violence should be a key piece of an organization's incident response planning. A Unique Training Opportunity The Arkansas National Guard and the National Protection and Programs Directorate Office of Infrastructure Protection within the U.S. Department of Homeland Security are hosting a one-day Sec...
March 4, 2015
Organizer: Department of Homeland Security
Location: North Little Rock, AR
Add Favorite
A Practical Guide to the Incurred Cost...
Who should attend: CFOs, Directors, Managers in functional areas of Contract Administration, Accounting, Finance, Compliance and Consulting. Any organization who are required to submit their incurred costs to the Federal Government What you will learn: What contractors must know about the Incurred Cost Submission ICS, including analysis of ICS Model Schedules, Contract Costs, and Rate Structures. A step-by-step guide to the preparation and fil...
March 4, 2015
Organizer: Federal Publications
Location: Denver, CO
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
A Decade of IC Integration & the Challe...
As the Office of the Director of National Intelligence reaches its 10th anniversary in April 2015, INSA invites you to a symposium discussing the impact of this landmark reorganization of the Intelligence Community. Current and former prominent leaders from government and industry will participate in panel discussions throughout the morning to share their perspectives on the role of ODNI in strengthening our national security, and challenges a...
March 3, 2015
Organizer: Intelligence National Security Alliance
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search