Back to Search Begin New Search Save Search Auto-Notify
The Cyber Attack Lifecycle in Government
According to the General Accountability Office, federal agencies have significant weaknesses in information security controls that continue to threaten the confidentiality, integrity, and availability of critical information systems used to support government operations, assets, and personnel. Pervasive and sustained cyber-attacks against the United States could have a potentially devastating impact on federal and nonfederal systems, disruptin...
February 24, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
SANS ICS Security Summit & Training 2016
Join us for the 11th annual ICS Security Summit. The Summit is the premier event to attend in 2016 for ICS cybersecurity practitioners and managers. This year's summit will feature more in-depth technical talks, case studies, and hands-on challenges than ever before. Summit Details Attendees come to the Summit to learn and discuss the newest and most challenging cyber security risks to control systems, and the most effective defenses. The Summ...
February 16-23, 2016
Organizer: SANS Institute
Location: Orlando, FL
Add Favorite
Digital Transformation in Government
The cyberattack risks faced by government, military and intelligence organizations have never been greater. Yet the digital life of citizens and war-fighters alike demand delivery of business communications electronically, securely, and reliably.This briefing will explore the trends that are spurring digital transformation in government while driving down cost, preserving privacy and stemming security risks. We’ll also explore how agenci...
February 18, 2016
Organizer: FEDINSIDER
Location: Washington, DC
Add Favorite
Dell Tech Briefing
Join your DoD and Civilian government peers and experts from Dell for an afternoon technology briefing on Tuesday, 26 January 2016 from 1600 - 1900 at the US Navy Memorial, 701 Pennsylvania Ave., NW, Washington, DC 20004. There will be an opportunity for networking and to view technology demonstrations from Dell's end user computing, networking, storage as well as identify and access management, network security and endpoint security solutions...
January 26, 2016
Organizer: Dell
Location: Washington, DC
Add Favorite
Cyber Insider Threat Training
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
December 17, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
GTRA SecureGOV Council Summit
Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issue...
November 15-17, 2015
Organizer: Government Technology Research Alliance (GTRA)
Location: Hot Springs, VA
Add Favorite
SPAWAR Pacific TechTalk Application Int...
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirement, while improving application performance, security, and reliability with an SSL/TLS design. During this SPAWAR Pacific TechTalk, you will: Learn about the requirements for SSL Visibility and SSL Break ...
November 9, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: San Diego, CA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
October 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search