Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
Gov 2.0 Summit 2010
From open data to social media, from web services to mobile applications, from crowdsourcing to cloud computing, government is exploring the power of the latest wave of technology to lower the costs of government while increasing its capabilities. Last year's inaugural Gov 2.0 Summit brought leaders from federal, state, and local government together with individual and corporate entrepreneurs, citizens, not-for-profits, and educators, to artic...
Computer Forensics for the Security Pra...
About This Training: Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Dis...
Symantec Enterprise Vault User Forum
Keep up with the latest in archiving, storage, and backup for Symantec Enterprise Vault! Please join us for our Enterprise Vault User Forum on Wednesday, September 1, 2010, in Washington, DC. During this workshop, you will have the opportunity to network with your peers, share ideas, and learn more about advanced topics in Enterprise Vault (EV) related to architecture, best practices, and integration with Exchange 2010. We will also give an ov...
Contractor Performance Assessment Repor...
The Naval Sea Logistics Center, Detachment Portsmouth is pleased to present a one-day training seminar on the use of the Contractor Performance Assessment Reporting System (CPARS). CPARS is an excellent tool for documenting contractor performance and is used throughout the Department of Defense and several other Federal Agencies! Benefits of the program include facilitating government-contractor communication, motivating improved contractor pe...
2nd Annual Identity Management for DoD...
IDGA is pleased to announce the 2nd Annual Identity Management for DoD and Government: Enhancing Government Data Collection, Sharing, and Protection! This year's summit will provide unprecedented insight into government-wide interoperability of credentials and Public Key Infrastructure (PKI) adoption by examining the emergence of government-wide electronic authentication and identity management guidelines, mandates, and standards. Visit the Co...
Veteran’s Hiring Authorities, Employmen...
Veteran’s Hiring Authorities, Employment Programs, & Resources Mandatory Training for Federal Human Resource Personnel Presidential Executive Order 13518, Employment of Veterans in the Federal Government requires annual training for agency human resources personnel and hiring managers concerning veterans’ employment, including training on veterans’ preferences and special authorities for the hiring of veterans. Presented...
Interactive Technologies Conference 2010
In government, industry, and educational institutions the need to reduce costs, improve personnel performance, increase organizational efficiency, and enhance product or service quality is a critical management responsibility in an era of organizational downsizing and heightened competitive pressures. A way to address these issues is through the application of the latest technologies for education and training systems, job performance improvem...
August 18-20, 2010
Organizer:
SALT Location:
Arlington, VA
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.