SANS Phoenix-Mesa 2017
At SANS Phoenix-Mesa 2017 (Oct. 9-14), improve your IT security skills, and stay ahead of the cyber adversaries who seek to harm your organization's assets. Learn from industry leaders teaching critical information and practical techniques in cyber defense, pen testing and security management to professionals on the front lines of cyber security.Take advantage of these opportunities to get the most out of your training:- Choose from seven info...
Predictive Analytics: Failure to Launch
How to Get Analytic Modeling Off the Ground and Into Orbit The vast majority of BI professionals and big data enthusiasts are excited about the prospects of predictive analytics and data mining, but are fully mystified about where to begin or even how to prepare. Of those who did initiate a modeling initiative, an industry survey of predictive modeling practitioners reported that 51% of data mining projects either never left the ground, did no...
ForgeRock Federal Forum: Identity and A...
Strategies for Securing Digital Government Identity and access management is the linchpin of digital government. Whether interacting with internal employees or external constituents, federal agencies need the ability to create a trusted digital relationship—ensuring that interactions are secure, privacy is protected, and the user experience is seamless. It's a complex undertaking, because of the complexity of the federal IT environment,...
OFAC Enforcement Trends: Exporters in t...
The pace of OFAC enforcement actions has increased slightly in 2017... While physical exports of U.S.- origin items make up only a portion of those cases, OFAC has continued to advance new theories of liability that threaten to expand the range of violative conduct for exporters and re-exporters in the United States and around the world. Most notably, in March 2017 OFAC reached its largest ever settlement with a non-financial institution ($100...
Cybersecurity: Protect, Detect, and Respond
Cloud computing, mobile devices, the Internet of Things, and the increasing digitization of information in a hybrid computing environment present new challenges to securing data and information, especially for government agencies. The cyber-threat landscape requires an ongoing and relentless focus on security, especially when considering that many current government security, privacy, and compliance policies were developed in an on-premises on...
October 12, 2017
Organizer:
FEDINSIDER Location:
Webcast
Cost Webinar Series
NCMA will be hosting its first "Spotlight on Cost" webinar series. Particpants earn 3.0 CPE/CLP credits for the webinar series and 1.5 CPE/CLP credits for the individual webinars. There is no limit to the number of people who can participate in each webinar. This discounted series allows an entire staff to be trained for one low cost, and with 14-day unlimited access to the webinar streams. Sign up now! October 12: Cost AnalysisKey Takeaways:...
The CyberMaryland Conference 2017
The CyberMaryland Conference is an annual two-day event presented jointly by The National Cyber Security Hall of Fame and Federal Business Council (FBC) in conjunction with academia, government and private industry organizations. The theme, “Leading the Cyber Generation,” captures the event’s intent to provide unparalleled information sharing and networking opportunities for development of cyber assets on both the human and t...
Encryption Export Controls 2017 Update
Encryption Export Controls 2017 Update The Bureau of Industry and Security (BIS) significantly changed the Information Security section of the Commerce Control List (Category 5 Part II) in August 2017 as a result of the 2016 Wassenaar Arrangement decision to rewrite certain Export Commodity Control Numbers (“ECCNs”). We are offering a webinar for those individuals who want to get an update on the changes (Federal Register) as well...
Harmonized System Classifications: Lear...
Practice Makes Perfect: A Two-Part Webinar that Combines Hands-On Exercises, Discussions, and Instruction. The Harmonized Commodity Description and Coding System (“Harmonized System”) is used by more than 150 countries, including the United States, for the classification of products that are traded around the world. For importers, understanding how to classify goods under the Harmonized System is critical for determining the duty r...
Hacker Halted 2017
Training Dates: October 5th - 8th Confrences Dates: October 9th - 10th The goal of the conference is to bring the IT security community together to discuss how organizations are often compromised through the smallest of mistakes and how implementing effective changes can have ripple effects throughout all departments of an organization. Training Courses Certified Ethical Hacker (CEH) Computer Hacking Forensic Investigator (CHFI) V8 Cert...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.