Back to Search Begin New Search Save Search Auto-Notify
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
TakeDownCon Rocket City Hacking and IT...
TakeDownCon, Hacking and IT Security Conference, a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most...
July 20-21, 2015
Organizer: EC-Council
Location: Huntsville, AL
Add Favorite
SANS Capital City 2015
Cybersecurity Training Washington DC Make your plans now to attend SANS Capital City 2015 this July and use what you learn in the classroom as soon as you return to the office. Choose from our outstanding offering of courses. We know that training and travel budgets are tight, so we are offering courses at the Capital Hilton. Many courses offered at Capital City 2015 are associated with a GIAC Certification attempt. Put the skills you'll learn...
July 6-11, 2015
Organizer: SANS Institute
Location: Washington, DC
Add Favorite
DOD Mobility Industry Day
On July 9, 2015 the Department of Defense Chief Information Officer (DoD CIO) will host a Mobility Industry Day at the Ronald Reagan Building and International Trade Center in Washington, DC. The event, “Capitalizing on Commercial Innovation,”will discuss DoD and Industry relationships and how the Department can better capitalize on the agility and innovation of the commercial sector.The purpose of this unclassified conference is t...
July 9, 2015
Organizer: AFCEA Washington, DC
Location: Washington, DC
Add Favorite
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
June 22-27, 2015
Organizer: SANS Institute
Location: Denver, CO
Add Favorite
Cyber Security for Defense
Defending Cyberspace is never an easy task. In fact, it is one of the most difficult duties now facing the United States Military. How do you defend against an enemy, either foreign or homegrown, that can anonymously attack from any direction thereby potentially crippling entire units without firing a single shot? Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attack...
June 24-26, 2015
Organizer: IDGA
Location: Augusta, GA
Add Favorite
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
June 25, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 23, 2015
Organizer: FEDINSIDER
Location: Midwest City, OK
Add Favorite
SANSFIRE 2015
For more than 10 years, the Internet Storm Center has been providing free analysis and warning to our community. SANSFIRE 2015 is not just another training event. It is our annual "ISC Powered" event. It taps into the expertise behind our daily postings, podcasts, and data collection efforts by offering evening events focusing on current trends and actual relevant threats. The strength of the Internet Storm Center is its group of handlers, who...
June 13-20, 2015
Organizer: SANS Institute
Location: Baltimore, MD
Add Favorite
Where the Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 18, 2015
Organizer: FEDINSIDER
Location: Golden, CO
Add Favorite
Back to Search Begin New Search