Back to Search Begin New Search Save Search Auto-Notify
SANS Baltimore 2016
Information security training in Baltimore, MD from SANS Institute, the global leader in information security training. Attend SANS Baltimore 2016 and choose from 10 hands-on, immersion-style security training courses taught by real-world practitioners. Don't miss the new SEC578: Cyber Threat Intelligence course, which will train you and your team to detect, scope, and select resilient courses of action in response to intrusions and data breac...
October 10-15, 2016
Organizer: SANS Institute
Location: Baltimore, MD
Add Favorite
Import Focused Assessment (Audit) Semin...
Importers: Are you prepared for a Customs Audit? Sign up for our Import Audit Class and protect yourself from business disruption, fines, and penalties that can result from regulatory intervention from U.S. Customs and Border Protection. Learn how to prepare for a Focused Assessment. Explore strategies for self-auditing your import program. Learn record keeping requirements, how to exercise reasonable care, how to create a compliance manual, a...
October 14, 2016
Organizer: Global Training Center
Location: La Mirada, CA
Add Favorite
2016 IT MODERNIZATION FORUM
This year's theme is "Federal Systems Legacy Systems Modernization: Oxymoron or Get a Move On?" Most federal departments and agencies are burdened with a large portfolio of legacy technologies that dampen the pace of innovation needed to transform agile service delivery and improve cybersecurity. The pressure on agencies to successfully modernize their systems is increasing from the Administration, Congress, and the Government Accountability O...
October 13, 2016
Organizer: ACT-IAC
Location: Washington, DC
Add Favorite
Leveraging As-a-Service to Overcome Gov...
According to the Office of Management and Budget, three-quarters of IT budgets are going toward the maintenance of legacy IT investments. As a means to adopt more efficient, secure, and modern IT systems and infrastructure, government is turning to an “as-a-service” model. This technique provides a self-sustaining mechanism for Federal agencies to regularly refresh their IT systems based on up-to-date technologies and best practice...
October 13, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Competitive Negotiations
Abstract: Government and industry must understand the rules of engagement as both parties enter into contract negotiations. Key Take-aways: Understanding FAR Part 15. Using the appropriate types of exchanges. Competitive discussions. Interested in learning more about the Federal Acquisition Regulation (FAR)? Join NCMA for our first three-week FAR Webinar Series! Earn 4.5 CPE hours by attending all three webinars or 1.5 CPE hours for each indi...
October 13, 2016
Organizer: National Contract Management Association
Location: Webcast
Add Favorite
Inspection and Assessment of Dams
This seminar provides comprehensive instruction in inspection and evaluation techniques for dams. The principles, concepts and procedures taught will be readily adaptable to any organization conducting dam inspections and evaluating their compliance with current design standards. The target audience is state and federal dam owners/regulators, local and private dam owners/operators, consulting engineers and personnel responsible for the operati...
October 11-13, 2016
Organizer: Association of State Dam Safety Officials
Location: White Plains, NY
Add Favorite
The Framework for Mobile Security in Go...
Government agencies have a combination of policy, technology and workforce requirements to address when mapping the framework for mobile security within their agencies. Security options are available at both the hardware and software levels and include encryption, rooted trust, kernel protection, and containerization. While crafting their security set-ups, technology staff also has to remember that users – real, live people – have...
October 12, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Webinar: Hydrologic Hazards – Estimati...
Hydrologic hazard curves are critical flood loading inputs for dam and levee safety risk assessments. Over the past decade, some Federal agencies have developed and applied new tools and data sets to estimate hydrologic hazard curves, which are graphs of peak flows, volume, or reservoir stages versus Annual Exceedance Probability (AEP). Hydrologic hazard curves provide a full probability distribution for the flood hazard, covering the range of...
October 11, 2016
Organizer: Association of State Dam Safety Officials
Location: Virtual
Add Favorite
Export Documentation & Procedures Semin...
Seminar Information An in-depth understanding of export procedures combined with a study of the appropriate documentation will give you a valuable advantage in making your international trade business a success. Class reviews the many components that make up the exporting process. Learn how to correctly prepare your Export Documents. Registration includes a copy of "Exporting: Regulations, Documentation & Procedures" reference book. Classe...
October 10, 2016
Organizer: Global Training Center
Location: Anaheim, CA
Add Favorite
SANS Seattle 2016
SANS, the global leader in cybersecurity training, is bringing six of our information security training courses to the Pacific Northwest, October 3-8, 2016. This new event will feature hands-on, immersion style training courses for those new to information security, as well as highly seasoned security professionals. All courses are taught by real-world practitioners and leading experts working in security today. And many of our courses are ass...
October 3-8, 2016
Organizer: SANS Institute
Location: Seattle, WA
Add Favorite
Back to Search Begin New Search