Back to Search Begin New Search Save Search Auto-Notify
MeriTalk Cyber Security Brainstorm
Join MeriTalk's Cyber Security Exchange for the fourth annual Cyber Security Brainstorm on Wednesday, September 23, 2015 at the Knight Conference Center at the Newseum in Washington, D.C. From insider threats to legacy security gaps to financial crimes and everything in between – it's no longer "if", but "when" in the government cyber incident arena. Government and partners across industry and academia are looking to improve collective c...
September 23, 2015
Organizer: MeriTalk
Location: Washington, DC
Add Favorite
Empower YOUR Business - How recent brea...
Danyetta Fleming Magana, CEO of Covenant Security Solutions and Janice D. Pryor, Director of CyberSecurity Training for Covenant discuss the latest trends in CyberSecurity including lessons learned and future impact of the OPM and Ashley Madison Breaches among others. Learn how these high profile breaches are affecting regulators and lawmakers and ultimately your business. Tune in to learn what you can do today to prepare your CyberSecurity po...
September 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Hacker Halted 2015: Examining the Cyber...
Hacker Halted is a global series of computer and information security conferences presented by EC-Council. The objective of the Hacker Halted Conferences is to raise international awareness towards increased education and ethics in IT security. This year’s Hacker Halted will take a look at the plague that is afflicting our society at all levels; The Cyber Pandemic. So what is the Cyber Pandemic? In our opinion this is the plaque of moder...
September 13-18, 2015
Organizer: EC-Council
Location: Atlanta, GA
Add Favorite
AGA Internal Control & Fraud Prevention...
Close to 600 government financial professionals and their counterparts in the private sector will convene to discuss fraud detection, data analytics, cyber security, improper payments and enterprise risk management. A sampling of sessions include: “Proactive Use of Data Analytics in Audits, Fraud Prevention and Detection,” addressing how to identify high-risk transactions and initiate investigations, ultimately reducing fraud, wast...
September 15, 2015
Organizer: Association of Government Accountants (AGA)
Location: Washington, DC
Add Favorite
2015 NSA-DHS-NIST Cybersecurity Innovat...
The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, and planned with the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing. The technical p...
September 9-11, 2015
Organizer: Federal Business Council, Inc.
Location: Washington, DC
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
August 27, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
TakeDownCon Rocket City Hacking and IT...
TakeDownCon, Hacking and IT Security Conference, a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most...
July 20-21, 2015
Organizer: EC-Council
Location: Huntsville, AL
Add Favorite
Cyber Security for Defense
Defending Cyberspace is never an easy task. In fact, it is one of the most difficult duties now facing the United States Military. How do you defend against an enemy, either foreign or homegrown, that can anonymously attack from any direction thereby potentially crippling entire units without firing a single shot? Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attack...
June 24-26, 2015
Organizer: IDGA
Location: Augusta, GA
Add Favorite
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
June 25, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Back to Search Begin New Search