Defense Logistics 2009
The Defense Logistics training conference is a cross-Service examination of the issues surrounding logistics strategies and support. Running since 1999, the Defense Logistics conference has become a set date on the calendars of 650+ logisticians and has proven to be the most influential and trusted forum of great logistics minds in the U.S.
The Annual North American Logistics Con...
The Defense Logistics training conference is a cross-service examination of the issues surrounding logistics strategies and support. Running since 1999, the Defense Logistics conference has become a set date on the calendars of 650+ logisticians and has proven to be the most influential and trusted forum of great logistics minds in the United States (U.S.)
U.S. Department of State/Foreign Servic...
This event is a one-day tabletop exposition, held on-site where attendees can interact with industry vendors who are displaying their products and services.Attendees are not only DOS employees but any government employee that is planning to travel overseas. In 2008, approximately 150 students, faculty, department heads, executive leadership, deans and administrative staff participated in this annual event.U.S. Department of State`s Foreign Ser...
December 3, 2009
Organizer:
FBC Location:
Arlington, VA
Computer Forensics for the Security Pra...
Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Disk Directory/Master-Fi...
Social Services Contracts and Grants
Identify and Obtain Critical Contracts and Grants for Your Agency: Draft proposals that demonstrate your projects' merit, excellence and innovationManage Grants and Cooperative Agreements: Manage grant work processes to encompass measurable performance outcomesUnderstand Audit Requirements for Grants: Examine audit requirements and prepare to show transparency and accountability in audit proceedingsImplement Performance-Based Contracting for S...
Emerging Trends in Crime and Attackers...
The “enemy” in today’s society is able to conduct their intelligence collections and attacks from any cyber-café in the world – miles or oceans away from their target by just using the Internet. Criminal groups have been using online methods and the Internet to further their business operations and goals. Targets of their activities have included US businesses and US government entities. The Internet has opened numerous avenues for perpetrator...
HCMF - Human Capital Management: Federal
HCMF delivers exceptional value for learning about key human capital strategies and initiatives across the Federal agencies and for meeting your peers looking for solutions to day-to-day challenges in managing and developing your workforce. It is an exciting time to be a human capital officer, with all the many opportunities to assess, change, and improve existing human resource policies and processes. Join government leaders and peers at this...
November 16-18, 2009
Organizer:
WB Research Location:
Arlington, VA
Open Source Tools and Applications for...
The Open Source Tools and Applications for Vulnerability Assessments Workshop will provide you with the training, skills, and resources to use a collection of planning, analysis, and 3D Visualization applications enabling you to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management.
DoD Crystal City 2009
Held only once a year, this one-day event attracts over 150 attendees and many relevant exhibitors showcasing their technologies. Past attendees have included: IT Specialists and Consultants, Project Managers, Security Managers, Training personnel, and Engineers. One of NETCOM`s recent initiatives is to establish tactics, techniques and procedures in direct support of expeditionary forces as well as project trained and ready forces to conduct...
November 10, 2009
Organizer:
FBC Location:
Arlington, VA
Computer Forensics for Managers Workshop
Both federal agencies and private companies are vulnerable to cyber attacks. Oftentimes, the attackers are targeting sensitive information for theft, which can lead to the compromise of data ranging from organizational strategies and classified intelligence, to financial, employee and customer records. The executives in charge have a fiduciary and public responsibility to protect sensitive data AND to preserve records that may facilitate disco...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.