Computer Forensics for Managers Workshop
Both federal agencies and private companies are vulnerable to cyber attacks. Oftentimes, the attackers are targeting sensitive information for theft, which can lead to the compromise of data ranging from organizational strategies and classified intelligence, to financial, employee and customer records. The executives in charge have a fiduciary and public responsibility to protect sensitive data AND to preserve records that may facilitate disco...
Air Quality VII Conference
The Air Quality Conference is the nation’s premier conference on carbon management, mercury, trace elements, SOx/NOx, and particulate matter. Every session has been updated for 2009, and several sessions are brand new. This is an incredible opportunity to gain insight and interact with some of the top industry experts. Learn about the topics you need to know about today… air quality impacts on policy, health and ecosystems, emission prevention...
Auditing and Evaluating Government Prog...
Course 1: Audit Performance Information -- Develop relevant program measures that align with agency objectives; Improve data quality systems with best practice performance auditing standards; Course 2: Program Evaulation -- Receive the latest updates on the state of program evaluation in the Obama Administration; Understand the key steps to build an evaluation system within your organization
Introduction to Operations Security (OP...
This workshop provides you with an overview of the OPSEC Process to protect sensitive and critical activities. You will understand the OPSEC process and techniques to protect critical activities within your organization and focus on the application of the OPSEC process within a government organization or private industry.
Anti-Terrorism and Force Protection Cou...
This 2-day seminar and workshop is designed to provide students with an advanced overview of the Antiterrorism Countermeasures and Force Protection Techniques used by the Department of Defense (DoD) and the civilian federal government. Recognizing this effort, many state and local government officials and corporations are looking to these standards to help them protect their critical infrastructure assets
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.