Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
Digital Cinematography 101
Topics: Introduction to Camera Basics - Frame rates, shutter angles, scene files; Introducing the HD DSLR Revolution; Understanding and selecting HD formats; Utilizing Color Space and Color Depth; Large Format Sensors, Lenses, and Image Quality; and more!
Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
Business Process Modeling & Analysis Workshop
Business Process Modeling & Analysis Overview Course 250 - 3 Days Business Process Modeling & Analysis is a crucial component of Business Process Improvement (BPI) efforts. It is also a critical but often overlooked activity in new systems development. The next generation of e-Business mandates rigorous business process modeling. In this seminar, you will learn the process modeling and analysis skills necessary to lead your team throu...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.