Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
F5 Air Force TechTalk - SSL Break and Inspect
Join F5 Networks and Carahsoft to earn one (ISC)2 CPE credit and discuss how to create an SSL/TLS strategy for Application Cybersecurity protection in the Datacenter. Learn which SSL/TLS standards are necessary to meet the new DoD requirements and how to increase application performance, security, and reliability with an SSL/TLS design. During this Cybersecurity TechTalk, you will: Learn about building SSL/TLS designs to mitigate web-based app...
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer:
FEDINSIDER Location:
Webcast
GSA Alliant and Alliant Small Business GWACs
FCL-GSA-0041 GSA Alliant and Alliant Small Business GWACs As a busy acquisition workforce professional, you need best-value solutions that save time, and leave more budget for your agency’s mission. Take advantage of our Schedules training. It provides an interactive learning experience, integrating web 2.0 and social media technology. Our training offers continuous learning points (CLPs) that may count toward your contracting certificat...
October 22, 2015
Organizer:
GSA Location:
Webcast
7th Commercial & Government Microgrids Summit
Infocast’s Commercial & Government Microgrids Summit, the 7th iteration of its kind, will provide a platform for decision makers from the Federal, State and Local- Levels to outline their microgrids funding opportunities and deployment plans in a number of applications for increasing energy security and grid resiliency. The event will also bring commercial end-users and utilities together with leading renewable energy and microgrid d...
October 20-22, 2015
Organizer:
Infocast Location:
San Diego, CA
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
Houston EAR Export Controls / ITAR Defe...
Export Administration Regulations (EAR), International Traffic in Arms Regulations (ITAR) and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with the latest updates on Export Control Reform (ECR): This seminar series provides both novice and experienced export compliance professionals with an in-depth education on export control regulations administered by the US Departments of State, Commerce & Treasury. Ex...
Contracting Officer's Representative (C...
Other dates and locations available for immediate registration. Reviewed and verified by the Federal Acquisition Institute (FAI) as meeting the training requirements for FAC-COR Level I. The Contracting Officer’s Representative (COR) is a crucial link between the Contracting Officer (CO) and the contractor. In effect, CORs are the eyes and ears of the contracting officer, ensuring that the work the contracting officer has authorized gets...
The Cyber Threat
A 2014 study found that out of 1,000 organizations, 84% were infected with malware and most had at least one bot in network. However, few were aware of the situation. Understanding the Cyber Threat is critical to preparing your defenses prior to attack and also instrumental in mounting a defense during attack. This webinar explores the threat and the role of the emerging discipline of Cyber Intelligence as a way of making threat information a...
October 21, 2015
Organizer:
PVBS Location:
Virtual
State and Local Tech Trends Virtual Training
State and local governments face a lot of challenges: shrinking budgets, federal mandates, resource constraints, an aging workforce, and the constant threat of a cyberattack. In our 2nd Annual State and Local Innovators Virtual Summit we surveyed attendees to learn about specific challenges facing public servants and their communities. On October 21st, join us for our State and Local Tech Trends Virtual Training as we share those results and s...
October 21, 2015
Organizer:
GovLoop Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.