Back to Search Begin New Search Save Search Auto-Notify
Sensitive Compartmented Information Fac...
After attending this unclassified class, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent eav...
August 6-8, 2019
Organizer: Haines Security Solutions
Location: Ft Mc Coy, WI
Add Favorite
FBINAA 55th Annual National Training Co...
On behalf of the Arizona Chapter of the FBI National Academy Associates, we would like to formally invite you to attend the premier training program for the world’s strongest law enforcement leadership network at the JW Marriott Phoenix Desert Ridge Resort & Spa. The FBINAA is a nonprofit membership organization whose mission is dedicated to impacting communities by providing and promoting law enforcement leadership through training...
July 20-23, 2019
Organizer: FBI National Academy Associates
Location: Phoenix, AZ
Add Favorite
ACI's Advanced Forum on DCAA & DCMA Cos...
DCAA business system audits are on the horizon for government contractors. What can your organization expect from these audits, and how can you best prepare? Find out at ACI’s Advanced Forum on DCAA & DCMA Cost, Pricing, Compliance & Audits on June 25 & 26, 2019 in Crystal City. Back for its 10th year, this highly regarded program gathers key government officials and distinguished industry leaders to offer updates, insights a...
June 25, 2019
Organizer: American Conference Institute
Location: Arlington, VA
Add Favorite
Stopping DNSpionage In Its Tracks: An A...
The international Domain Name System isn't just infrastructure. It works hand-in- hand with SSL/TLS-based authentication and encryption systems to provide a foundation of trust and privacy across the internet.Earlier this year, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency detected an ongoing threat to federal agencies and issued the Emergency Directive 19-01. The attacks compromised DNS records and cre...
June 6, 2019
Organizer: Venafi Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
The Hows and Whys of High Fidelity Bro/...
*Attend & receive 1 (ISC)2 CPE credit! Join Corelight and Carahsoft on May 1st for a presentation on how to leverage "Bro/Zeek" data during cyber investigations. The modern Security Operations Center (SOC) consumes an immense amount of data, however not all of it is useful during an investigation. In fact, the data often comes from a number of disparate sources with little to no correlation except time. This places a heavy burden on cybers...
May 1, 2019
Organizer: Corelight Gov Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Other Transaction Authority - OTA Seminar
OTA Seminar Description What is OTA - Other Transactional Authority? It is a legally binding instrument more like a commercial-sector contract between the government and industry. Synopsis of the Seminar: “OTAs are on the rise for two primary reasons: 1) their flexibility is well-suited to the less predictable, more accelerated process of innovative R&D, and 2) they are not subject to most standard acquisition laws and regulation fro...
April 18, 2019
Organizer: NOVA Hispanic Chamber of Commerce
Location: Arlington, VA
Add Favorite
UFC-DOD Minimum Antiterrorism Standards...
UFC – Minimum Antiterrorism Standards for DOD Buildings: This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. The course is designed to familiarize students with the fundamentals of Security Engineering and antiterrorism as they relate to protecting critical facilities from common criminals and acts of terrorism. Much of the course is dedicated to understanding and ap...
April 16-18, 2019
Organizer: Haines Security Solutions
Location: USAG Ft Mc Coy, WI
Add Favorite
Vulnerability Assessments and Risk Anal...
(VAR) Vulnerability Assessments and RiskAnalysis Methodologies – A variety of fivequalitative and quantitative methodologiesare discussed in detail. Students will learnthe differences between qualitative andquantitative risk analysis. They will use avariety of methodologies by evaluatingsingle or multiple buildings and criticalinfrastructure nodes. Three full days of fieldevaluations assessing lighting, electricsystems, drinking water, i...
March 19-21, 2019
Organizer: Haines Security Solutions
Location: USAG Joint Base Lewis-McChord, WA
Add Favorite
PLM Certificate Program
For 35 years, CIMdata has been working in the Product Lifecycle Management (PLM) industry. Our consulting services and research expertise are known around the world for their best-practice-based content. CIMdata has leveraged its first-hand, working knowledge and experience to create the CIMdata PLM Certificate Program—the PLM industry’s most comprehensive non-biased education and training offering for today’s PLM professiona...
March 4-8, 2019
Organizer: CIMdata
Location: Ann Arbor, MI
Add Favorite
Security Criteria Development: Exceedin...
(SCD) Security Criteria Development: Exceeding DHS Guidelines – A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into...
March 5-7, 2019
Organizer: Haines Security Solutions
Location: Washington DC, DC
Add Favorite
Back to Search Begin New Search