Back to Search Begin New Search Save Search Auto-Notify
Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
June 3, 2015
Organizer: Websense, Inc.
Location: Webcast
Add Favorite
IBM Managed File Transfer - The Unsung...
Providing Flexibility, Reliability, Security, and Visibility for Data Movement Are file transfers important to your agency? Do you want the comfort of knowing that your files are sent successfully, securely, and on time? If you answered yes to any of the above, then please join IBM MFT/B2B Program Director, Brian Gibb for a complimentary webcast focused on optimizing your managed file transfer environment. Why Attend? Attendees will learn abou...
June 2, 2015
Organizer: ESVA, Inc.
Location: Webcast
Add Favorite
Corporate Gray/MOAA Virtual Military Job Fair
Virtual Military Job Fair sponsored by Corporate Gray and MOAA... Connect online directly with employers nationwide seeking to hire transitioning and former military personnel at this virtual recruiting event. Engage in electronic text chats with company representatives to discuss their opportunities and how your skills and experience may be a match. FREE and exclusively for transitioning and former military of all ranks and branches of service!
May 27, 2015
Organizer: Competitive Edge Services, Inc. "Corporate Gray"
Location: Webcast
Add Favorite
Use Advanced Machine Learning to Your A...
Has your organization experienced a security breach and didn't immediately realize it occurred? Do you need a real-time, cyber defense network-based detector that sits above or below a proxy and analyzes network traffic, both inbound and outbound, for Advanced Persistent Threats (APT) intrusion and infection detection? Join us for a one-hour webinar showcasing a solution that not only complements existing signature-based solutions, such as SIE...
May 19, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
Cybercrime Trends and Scenarios – What...
Cyberattacks continue to evolve and plague the global economy. What was once an annoyance and something financial institutions needed to worry about has now morphed into a worldwide epidemic of attacks, breaches of personal information, financial loss to consumers, and personal accountability placed on company executives and boards of directors. At the same time, there are dozens of companies that purport to “solve” the security pr...
May 19, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Privacy, Cybersecurity and Social Media
A discussion on privacy and how it is evolving with social media such as Facebook, Twitter and LinkedIn. We will discuss the differences between how this is being handled domestically in the United States versus the international views of other countries on privacy.
April 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Professionalization and the Cybersecuri...
The increasing frequency and scale of reported cyber attacks, highlights the need for a cybersecurity workforce of sufficient size and quality to meet the evolving threat environment. To address this need, some cybersecurity experts call for enhanced professionalization requirements. Certification, licensure, skill-based competency exams, and a national association all have been advanced as components of a comprehensive workforce strategy to a...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search