Back to Search Begin New Search Save Search Auto-Notify
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
reStart MD: Technical Hiring & Networki...
Allocate your time wisely, efficiently and toward your next career…join us at reStart! reStart is committed to delivering the finest, most convenient and effective hiring events to move your career in a direction you want. Our program is designed for professionals actively seeking new employment, on a contract that’s coming to an end or wish to build a foundation for future career development by exploring the latest positions avai...
May 6, 2015
Organizer: reStart, Inc.
Location: Linthicum Heights, MD
Add Favorite
reStart VA: Technical Hiring & Networki...
Allocate your time wisely, efficiently and toward your next career…join us at reStart! reStart is committed to delivering the finest, most convenient and effective hiring events to move your career in a direction you want. Our program is designed for professionals actively seeking new employment, on a contract that’s coming to an end or wish to build a foundation for future career development by exploring the latest positions avai...
May 5, 2015
Organizer: reStart, Inc.
Location: Tysons Corner, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
April 30, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
2015 North American IPv6 Conference
Two-day general session on IPv6 with a variety of speakers. Access to the Virtual Trade Show, playback of sessions, access to marketing materials and sponsor engagement through August, 2015. Learn about the benefits of using IPv6 from experts Gain valuable information to prepare you and your organization for this new wave of Internet innovation Lunch and refreshments provided Optional: One entire day of pre-conference tutorials (for an additio...
April 22-23, 2015
Organizer: RMv6TF
Location: Greenwood Village, CO
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer: EC-Council
Location: Greenbelt, MD
Add Favorite
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer: SolarWinds
Location: Austin, TX
Add Favorite
Back to Search Begin New Search