Webcast: OmniGov Training Institute EEO...
TOPIC: Investigating Claims of Disability Discrimination & Reasonable Accommodation Disability claims tend to be the most complicated. Jeanette will break down the legal elements of a disability discrimination claim, including failure to accommodate, in light of the recent Americans With Disability Amendments Act. Easy to follow investigator tips, including what questions to ask and what documents to request, make this session helpful to b...
Anti-Money Laundering: A Guide to the L...
Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime. Register for this webinar to receive first-hand advice from a veteran anti-money laundering investigator on: Key anti-money laundering laws; Penalties for money-laundering crimes; How your organization can best respond to money-laundering mandates, whethe...
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
Meet agency directives and regulations...
Delivering a secure and reliable IT environment requires automated IT Change and Configuration Management. Meet the demands of regulations and agency directives like VA Directive 6500, FISMA, FIPS 200, & NIST SP 800-53 with ChangeGear from SunView Software. Learn how the ChangeGear solution simplifies the implementation of IT controls and helps you meet the key provisions of today's federal regulations. With automated approvals and notific...
OmniGov Training Institute’s EEO Wednesdays
TOPIC: Informally Resolve More Cases! If you are an EEO Counselor or other EEO professional involved in informally resolving dispute, you won't want to miss this discussion. Participants will learn about their role as a facilitator and how they can get the parties to talk about what is REALLY bothering them. Participants will be able to articulate to the parties of the dispute the true benefits of informal resolution, talk them through the man...
Application Whitelisting: Allow Known G...
Application Whitelisting: Allow Known Good to Prevent the Bad In the days following the recent IE vulnerability (Aurora) attacks, Gartner’s Neil MacDonald advised, "Application whitelisting at the endpoints would have stopped these attacks." Shortly after, companies targeted by this attack chose Bit9 – named 2010 Technology of the Year by InfoWorld – to protect their systems. Carahsoft invites you to join Bit9 for this live w...
The Changing Landscape of International...
Michael J. Penders, Esq., President of Environmental Security International will convene Security and Sustainability Forum's May live webcast from Washington DC on International Standards for Supply Chains and innovations in safety, sustainability, and security. Included in this webcast will be discussions on water and agriculture supply. Large and small businesses in this rapidly growing industry will benefit as Penders brings experts togethe...
Secure and Manage Your Environment Thro...
Communication is one of the most important aspects of today's work environment. Therefore it's possible that employees use any number of the following methods of communication: email, instant messaging, voice and video. Date: Tuesday May 25, 2010Time: 2:00 – 3:00pm Eastern TimeRegister: www.dlt.com/Quest/CommWebcast During this webcast you’ll see how to prevent intentional or inadvertent breaches of sensitive or protected data by:...
INPUT Webinar: GSA Schedule 70 ...
INPUT estimates that state and local governments will spend $2 billion annually on information technology products and services through the General Services Administration (GSA) Cooperative Purchasing Program by FY 2015. State and local governments spent more than $550 million in federal FY 2009 through GSA schedules. This webinar will examine the trends and drivers along with the growth trajectory for state and local government use of GSA sch...
May 25, 2010
Organizer:
INPUT Location:
Webcast
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.