Back to Search Begin New Search Save Search Auto-Notify
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
May 25, 2010
Organizer: GovInfo Security
Location: Webcast
Add Favorite
Oil Spills, Floods & Terrorists: Emerge...
SSF's webcasts convene panels of current and former federal decision makers to tell you what a government agency is buying and how to position for its security and sustainability grants, contracts and R&D programs.One Katrina-like emergency can strain the resources of government response agencies. Multiply that by three and the Coast Guard, FEMA, Army Corps of Engineers, FBI, and a host of state and local control agencies hit the national...
May 24, 2010
Organizer: Kim Fletcher
Location: Washington, DC
Add Favorite
INPUT Supports: Association of Strategi...
Join Association of Strategic Alliance Professionals’ D.C. Chapter for an online presentation that will show what the best and the brightest actually do to create alliance success and how novice organizations and individuals can learn from the successes and failures of long-time partnerships to demonstrate best practices in action. What You Will Learn: •What the best and the brightest actually do to create alliance success •R...
May 20, 2010
Organizer: ASAP
Location: Webcast
Add Favorite
Maintaining Secure Government Informati...
Join us for a webinar to learn how to effectively support environments that require the highest levels of security, including Common Criteria, STIG, FIPS 140-2 and DCID 6/3. Topics will cover: Industry leading protection with SELinux - a mandatory Access Control System based on collaboration with the National Security Agency User authentication and access control with industry standard management and identity products Ease in automated provisi...
May 20, 2010
Organizer: GovInfo Security
Location: Webcast
Add Favorite
Are You Compliant... and SECURE?
With the announcement of new performance metrics for compliance standards from the OMB, agencies need to move from static, compliance based security to risk management based on real-time monitoring and analysis. Please join Ken Halley of Symantec and The Winvale Group for a complimentary webinar to learn how Symantec’s Risk Automation Suite (formerly SecureFusion) can enable automated and integrated vulnerability management. You will al...
May 20, 2010
Organizer: The Winvale Group
Location: Webcast
Add Favorite
Managing and Protecting Government Netw...
Please join The Winvale Group and Allot Communications for a live webinar, “Managing and Protecting Government Networks in a Changing World”, on Thursday, May 19th, at 1:00 pm (EST). During this webinar, you’ll learn how Allot solutions can be deployed to: - Enable dynamic congestion control and long term capacity planning - Ensure appropriate use of network assets - Implement policies to control access to specific applicati...
May 19, 2010
Organizer: The Winvale Group
Location: Webcast
Add Favorite
Using Bidspeed to Find, Manage and Win...
May 19, 2010 – Using Bidspeed to Find, Manage and Win Government Contracts This Webinar will show you how to use Bidspeed effectively to find, manage, and win government contracts. If you’re new government contracting or new to Bidspeed, you should definitely attend. Space is limited. Reserve your Webinar seat now at:https://www1.gotomeeting.com/register/374814033Date: Wednesday, May 19, 2010Time: 10:00 AM – 11:00 AM PDT Aft...
May 19, 2010
Organizer: Bidspeed
Location: Webcast
Add Favorite
The Reality of Cyberattacks: Emerging S...
Recent research shows clearly that our critical infrastructure is under repeated cyberattack often from high-level adversaries like foreign nation-states. In fact the estimated cost from downtime, caused by major attacks, exceeds $6M per day. It's now confirmed: Our critical infrastructure is under repeated cyberattack from high-level adversaries. Register for this webinar to learn: The top cyber risks to public and private sector organization...
May 13, 2010
Organizer: GovInfo Security
Location: Webcast
Add Favorite
Prioritize Application Testing Using A...
Prioritize Application Testing Using A Risk-Based Approach Risk-based quality management allows project leaders to evaluate the level at which to test each requirement, based on the nature of the requirement and available project resources. Understanding the priority and risk associated with each requirement also allows project leaders to drive the right focus in the development, validation efforts, and staffing levels. This is your last chan...
May 13, 2010
Organizer: Carahsoft Technology Corp.
Location: Webcast
Add Favorite
INPUT Webinar: Technology Trends for Fi...
This webinar will examine the current state of the Justice and Public Safety (JPS) Technology Market. Drawing upon INPUT’s original research along with insights from other trusted sources, this webinar will cover JPS market drivers, with special attention paid to emerging technologies for first responders. The webinar will be presented by Justin Spratley, Analyst, Justice and Public Safety. What You Will Learn: Key market drivers and tre...
May 11, 2010
Organizer: INPUT
Location: Webcast
Add Favorite
Back to Search Begin New Search