F5 Gov TechTalk - SSL Break and Inspect
SSL Break and Inspect Join F5 Networks, World Wide Technology, Inc. and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for application cybersecurity protection in the data center. Learn which SSL/TLS standards are necessary to meet the new federal requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn...
January Monthly Speaker Series: Governm...
Gartner recently reported that, along with infrastructure and analytics, cloud computing is one of the top three high tech priorities for government CIOs. Federal adoption of cloud has lagged behind other industries, and visibility of assets and concerns over exposing data to serious risk are posing an impediment to adoption of the government’s Cloud First mandate. This briefing will bring government stakeholders to the table to discuss...
January 21, 2016
Organizer:
AFFIRM Location:
Washington, DC
What You Need to Know About the Minneso...
Understand the data practices and the open meetings law in Minnesota so you can use them to your advantage. This topic will examine the pair of Minnesota "Sunshine" laws: the Government Data Practices Act and the Open Meeting Law. Review the history and development of the two measures and focus on a number of the most challenging and important provisions of the two statutes, as well as the interaction between them and Federal laws, including e...
Innovations in Sewer Maintenance
Become aware of recent sewer innovations and keep your agency or clients ahead of the curve. Many agencies are at a crossroads when they look at their sewer systems. On the one hand, the federal agencies, such as the EPA, are issuing consent decrees for overflows at an accelerating rate; the funds that agencies have are shrinking and much of the experienced staff of these agencies are leaving the work force for a variety of reasons. As sewer s...
Illuminate the Darkness: Detect Advance...
Join F5 Networks and ClearShark to earn one (ISC)2 CPE credit and discuss how to protect internet users with SSL Intercept technology. Learn how adversaries increasingly evade cybersecurity tools by using SSL/TLS as a cover of darkness for malicious activity and how AirGap Inspection with SSL Intercept technology peels back this cover and revitalizes network perimeter defenses. During this Security TechTalk, you will: Learn how current solutio...
Vulnerability Assessments and Risk Anal...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerous field exercises assessing lighting, electric systems, drinking water, perimeter. A total of 5 different methdologies will be used by the attendees. They will be able to write a compr...
SANS Las Vegas 2016
You are invited to start your training for 2016 by attending our new event in the SANS training lineup, SANS Las Vegas 2016, where SANS will provide outstanding courses in IT security, forensics, and security management, and ICS/SCADA presented by the best cybersecurity teachers in the country. At SANS events you get the kind of hands-on, immersion training that you can put to work immediately.Visit our Schedule page for complete course descri...
ATARC Federal Cloud Computing Summit
The ATARC Federal Cloud Computing Summit will be held on Wednesday, January 13, 2016 at the Washington Marriott at Metro Center in Washington, D.C. This educational one-day symposium will feature cloud computing subject matter experts from the Federal government and academia participating on panels. (Cloud Summit Agenda) The MITRE-ATARC Cloud Symposium will discuss and white-board various cloud "challenge areas” and produce a White Paper...
January 13, 2016
Organizer:
ATARC Location:
Washington, DC
AGILE Development in Government Trainin...
Overview: Many Federal agencies are now utilizing Agile methods such as Scrum to manage their software development efforts. The goal for most of them is to reduce risk and accelerate system delivery to their end users. By using Scrum with the development team they have achieved part of their goal. But major risks and speedbumps still exist after the software is developed. These are encountered during deployment by the operations groups and ar...
Cloud Computing and FedRAMP Security In...
Cloud Computing and FedRAMP are now indistinguishable. The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP is celebrating its three anniversary since IOC with more than thirty-six JAB or Agency approved cloud services, with more than forty more in process. This...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.