Back to Search Begin New Search Save Search Auto-Notify
SANS Alaska Summit & Training 2016
Securing our Organizations and Critical Infrastructures in Alaska!SANS is bringing our renowned cybersecurity training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great Alaskan wilderness. SANS Alaska will feature two hands-on, immersion-style security training courses taught by real-world practitioners August 21-27, 2016 in Anchorage.Take IC...
August 22-27, 2016
Organizer: SANS Institute
Location: Anchorage, AK
Add Favorite
Predictive Analytics & Data Mining: Str...
LEARN WHAT MANAGERS & PRACTITIONERS REALLY NEEDTO KNOW ABOUT PREDICTIVE ANALYTICS & DATA MINING Get up to speed in data mining faster and more effectively than with any other training program available. Leverage highly valuable and impactful prospective insight from within your existing data through an intensive course series with over 20 years of innovation.If you want to learn what really works in predictive modeling and why you shou...
August 22-26, 2016
Organizer: The Modeling Agency
Location: Los Angeles, CA
Add Favorite
8th Annual Lowering the Cost of Gov wit...
FedScoop's 8th Annual Lowering the Cost of Government with IT Summit will bring government and industry IT leaders together to discuss the best ways government can become more efficient and save money through the use of innovative technologies. The discussion will focus on agile development, cybersecurity, cloud and a variety of other best practices for lowering the government's cost of doing business. 8th Annual Lowering the Cost of Gov with...
August 25, 2016
Organizer: FedScoop
Location: Washington, DC
Add Favorite
Part 2: The Business of Cloud
Five years after the launch of the Administration’s cloud first policy, government CIOs still face procurement, management, and security obstacles when moving to the cloud. Some of the challenges involve changes in responsibility between industry partners and application support staff. Others related to clear contracting language that spells out ownership and responsibility for problem resolution in a cloud environment. Lastly, security...
August 25, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Protecting Federal Cybersecurity Inform...
Recent hacks and breaches are driving regulators to hold contractors more accountable for protecting the federal cyber environment, establishing more structured, meaningful, and effective cybersecurity compliance requirements for contractors. This webinar will examine five key things contractors need to know about new guidance. Learning Objectives: The different types of federal information contractors are required to protect. Recent legislat...
August 25, 2016
Organizer: National Contract Management Association
Location: Webcast
Add Favorite
F5 Silverline DDoS Protection Services:...
Over the past decade, the increased integration of technology into the classroom has resulted in an instructional dependence on computers and their connectivity to the Internet. While in most cases school computers are safeguarded through access restrictions and anti-virus / anti-malware type programs, the Internet connectivity has been largely left unprotected. As a result, instructional interruptions are occurring at an alarming rate through...
August 25, 2016
Organizer: F5 Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Subcontracting Under the FAR
Sharpen the skills necessary to understand key issues in subcontracting. This course covers the complex relationships between the federal government, prime contractors and subcontractors. Subcontracting Under the FAR is a must for negotiating and managing subcontracts whether you are a buyer, seller or government official. After completing this course you will understand the role of teaming agreements, contract clause flow-down, consent to sub...
August 24-25, 2016
Organizer: Centre Law and Consulting
Location: Tysons Corner, VA
Add Favorite
Security Summit: Getting the Edge on Cy...
In October 2015, the Office of Management and Budget released its much-anticipated Cybersecurity Implementation Plan (CSIP), a multi-pronged initiative aimed at getting agencies up to speed on cybersecurity. The strategy reflects the dual realities of the cybersecurity challenge: The increasingly diverse and sophisticated nature of today’s cyber threats, and the increasingly complex nature of the federal enterprise to be protected. A str...
August 24, 2016
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Reporting and Disclosure Requirements o...
Understand the applicable disclosure regulations and standards that apply to recipients of federal relief funds. Over the past several years, the federal government has required contractors and grant recipients to disclose various noncompliance to the awarding agency or face stiff consequences. These requirements have caused significant unease and tension between the contractor/grant recipient community and the federal government. For this top...
August 24, 2016
Organizer: Lorman Education Services
Location: Webcast
Add Favorite
Securing Intelligence in an Open Hybrid Cloud
According to market intelligence firm IDC, 91% of IT organizations rely on open hybrid cloud as the de facto enterprise IT architecture. Open source is a key enabler of this rapid innovation and is driving the increased adoption of next generation technology and IT service delivery solutions. As open hybrid cloud becomes widely adopted questions surrounding security in the cloud and of open source hybrid cloud technologies in particular are pr...
August 24, 2016
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search