GEOINTeraction Tuesday
Held the second Tuesday of every other month, GEOINTeraction Tuesday is a casual networking event where you can develop new relationships, exchange ideas and discover business opportunities. Each event features a guest speaker from the Defense, Intelligence, or Homeland Security Community who shares their views on current issues and answers audience questions. National Geospatial-Intelligence Agency Deputy Director Susan M. Gordon will be spea...
May 12, 2015
Organizer:
USGIF Location:
McLean, VA
The Cloud Security Alliance Federal Summit
The Cloud Security Alliance Federal Summit is a free for government, full-day event being held May 5, 2015 at the Ronald Reagan Building & International Trade Center in Washington, DC. Expected to attend are over 250 well-qualified attendees with an interest in cloud security, primarily from federal agencies and related organizations. Program Topics CSA Software Defined Perimeter (SDP) Initiative Status of CSA and FedRAMP collaboration eff...
Cyberthreats: The New Strategic Battleground
Join the Alaska World Affairs Council for "Cyberthreats: the New Strategic Battleground" with Lawrence Husick, author, intellectual property lawyer, and technology consultant. This program will take place on Friday, May 1st at noon at the Anchorage Hilton Hotel. Doors open at 11:30am; come early to network and secure your seat. This event is free for students and up to 25 active duty military with valid IDs.
SANS Security Operations Center Summit...
As we see regularly in the news, the number of successful data breaches continues to increase. Adversaries seem to have the upper hand, as many organizations fail to effectively detect and quickly respond to these breaches. Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams, and are often caught by surprise. As a result, executives are demanding that their security teams provid...
April 24 - May 1, 2015
Organizer:
SANS Institute Location:
Arlington, VA
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Vanguard Security & Compliance East 2015
Vanguard Security & Compliance™ is the most advanced cybersecurity educational summit dedicated to IBM®System z®. In 2015, Vanguard Security & Compliance East will feature highly regarded security and compliance experts from around the world. Experts from CA, IBM, Vanguard, and private industry will present the most current information and instruction about cybersecurity threats, protection, configuration and compliance i...
Privacy, Cybersecurity and Social Media
A discussion on privacy and how it is evolving with social media such as Facebook, Twitter and LinkedIn. We will discuss the differences between how this is being handled domestically in the United States versus the international views of other countries on privacy.
INSA Leadership Dinner with CIA Dir. Jo...
Join INSA for a Leadership Dinner with the Honorable John O. Brennan, Director, Central Intelligence Agency on Tuesday, April 28 at the Hilton McLean Tysons Corner in McLean, VA. Director Brennan will deliver keynote remarks related to the key challenges and opportunities facing the CIA, the IC and our nation. Following dinner, Director Brennan will participate in a discussion and take questions from the audience. Highlights will include: Key...
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
2015 North American IPv6 Conference
Two-day general session on IPv6 with a variety of speakers. Access to the Virtual Trade Show, playback of sessions, access to marketing materials and sponsor engagement through August, 2015. Learn about the benefits of using IPv6 from experts Gain valuable information to prepare you and your organization for this new wave of Internet innovation Lunch and refreshments provided Optional: One entire day of pre-conference tutorials (for an additio...
April 22-23, 2015
Organizer:
RMv6TF Location:
Greenwood Village, CO
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.