TBM Executive Foundation Course
Improve your business acumen by taking the first-ever education program specifically designed for tomorrow’s business-minded technology leaders. The TBM Executive Foundation course provides senior IT leaders and finance managers the essential knowledge that drives business transformation within IT by running a successful Technology Business Management (TBM) program. Over 1600 IT and Finance leaders have already participated in the course...
Down & Dirty - GSA schedules - A Tactic...
Topic: Government Contracting The University of Mary Washington Center for Economic Development will host " Down & Dirty - GSA schedules - A Tactical Guide" This hands-on workshop will provide assistance to companies who already meet the basic requirements of the GSA Schedule. The Administrative, Technical and Pricing Sections will be discussed and direction will be provided on how to complete these Sections and the additional complex GSA...
reStart Tysons Corner Hiring & Networki...
reStart, the most successful Hiring & Networking Events for Cleared Professionals is pleased to invite you to join us at our first events of 2019: Whether you are furloughed, seeking new employment, transitioning from the military or your contract is coming to an end, join us and meet with dozens of companies interviewing on-the-spot at these upcoming events: AN ACTIVE SECURITY CLEARANCE IS REQUIRED FOR THIS EVENT: Tuesday, January 29thTh...
ICIT Winter GOVSummit
Technology and data are business enablers. Yet too often, fears of privacy compromise, policy violations, and data breach overwhelm organizations to the point of becoming obstacles to innovation and change. To truly support the mission, technology and security leaders must harness the power of readily available tools and strategies that will enable them to build secure, trusted applications to meet the growing needs of internal and external cu...
reStart BWI Hiring & Networking Event
reStart, the most successful Hiring & Networking Events for Cleared Professionals is pleased to invite you to join us at our first events of 2019: Whether you are furloughed, seeking new employment, transitioning from the military or your contract is coming to an end, join us and meet with dozens of companies interviewing on-the-spot at these upcoming events: AN ACTIVE SECURITY CLEARANCE IS REQUIRED FOR THIS EVENT: Monday, January 28thBWI...
Cybersecurity Technical Excellence Workshop
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
Does Your Password Vault Do This?
Managing privileged account passwords is a first step to strengthen your security posture, but important gaps remain that can easily be exploited by bad actors. Learn how to combine password vaulting with the following, all while securing remote access and monitoring all privileged sessions: Brokering of identitiesMFA enforcementJust-enough privilege
January 24, 2019
Organizer:
Centrify Location:
Webcast
Compliance Challenges with Canadian and...
Addressing Compliance Challenges in the Interaction of Canadian and US Economic Sanctions and Export Controls in 2019 Canada is now a “sanctions hawk”. The traditional view that Canadian trade controls are less aggressive than or least similar to their US counterparts is no longer accurate and is causing significant compliance and enforcement challenges for Canadian as well as US companies operating in Canada. Those firms that fail...
Shred the Paper: How Digital Signatures...
Time is a fleeting resource for government agencies. And paper processes are a time sucking constraint on the organization. Just consider how long it takes for a government agency to process, verify and store a paper record. But what if agencies ditched the paper, tossed their pens and embraced digital signatures in a process that could be much faster, more efficient and secure? That’s what leading organizations are experiencing with dig...
January 24, 2019
Organizer:
GovLoop Location:
Webcast
Silicon Valley Cyber Security Summit
The second annual Silicon Valley Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.