Intelligent Threat Detection in Government
Whether created maliciously or unwittingly, insider threats can result in grave damage to national security interests. Traditional methods of detection rely on monitoring structured data, such as system access logs. However, critical insights that can help thwart an attack lay hidden in massive volumes of unstructured data. Unstructured data represents typically 80% of available information and typically remains unobserved and underutilized. C...
August 30, 2016
Organizer:
FEDINSIDER Location:
Webcast
Creating a Culture of Engagement in Gov...
This is an updated Encore Training Workshop based upon a very successful and highly acclaimed Workshop in May 2016. Student rated the Workshop as “Excellent” and requested a repeat workshop to permit additional staff to attend. This updated “Encore” Workshop is scheduled at the request of previous students! The White House set a goal of raising the government wide engagement score to 67% by the 2016 Federal Employee Vie...
SANS Chicago 2016
We are pleased to invite you to the Palmer House Hilton in downtown Chicago - our campus for SANS Chicago 2016 this August. Why attend? Attackers are targeting you with increasing viciousness and stealth, and it's essential you understand the tools and techniques and learn the skills needed to protect your organizations. Get the training you need from SANS - the most trusted and by far the largest source for information security training in th...
SANS Alaska Summit & Training 2016
Securing our Organizations and Critical Infrastructures in Alaska!SANS is bringing our renowned cybersecurity training to Alaska! Join us in August for a week of hands-on training and compelling bonus sessions while taking in breathtaking views and experiencing the great Alaskan wilderness. SANS Alaska will feature two hands-on, immersion-style security training courses taught by real-world practitioners August 21-27, 2016 in Anchorage.Take IC...
Predictive Analytics & Data Mining: Str...
LEARN WHAT MANAGERS & PRACTITIONERS REALLY NEEDTO KNOW ABOUT PREDICTIVE ANALYTICS & DATA MINING Get up to speed in data mining faster and more effectively than with any other training program available. Leverage highly valuable and impactful prospective insight from within your existing data through an intensive course series with over 20 years of innovation.If you want to learn what really works in predictive modeling and why you shou...
8th Annual Lowering the Cost of Gov wit...
FedScoop's 8th Annual Lowering the Cost of Government with IT Summit will bring government and industry IT leaders together to discuss the best ways government can become more efficient and save money through the use of innovative technologies. The discussion will focus on agile development, cybersecurity, cloud and a variety of other best practices for lowering the government's cost of doing business. 8th Annual Lowering the Cost of Gov with...
August 25, 2016
Organizer:
FedScoop Location:
Washington, DC
Part 2: The Business of Cloud
Five years after the launch of the Administration’s cloud first policy, government CIOs still face procurement, management, and security obstacles when moving to the cloud. Some of the challenges involve changes in responsibility between industry partners and application support staff. Others related to clear contracting language that spells out ownership and responsibility for problem resolution in a cloud environment. Lastly, security...
August 25, 2016
Organizer:
FEDINSIDER Location:
Webcast
Protecting Federal Cybersecurity Inform...
Recent hacks and breaches are driving regulators to hold contractors more accountable for protecting the federal cyber environment, establishing more structured, meaningful, and effective cybersecurity compliance requirements for contractors. This webinar will examine five key things contractors need to know about new guidance. Learning Objectives: The different types of federal information contractors are required to protect. Recent legislat...
F5 Silverline DDoS Protection Services:...
Over the past decade, the increased integration of technology into the classroom has resulted in an instructional dependence on computers and their connectivity to the Internet. While in most cases school computers are safeguarded through access restrictions and anti-virus / anti-malware type programs, the Internet connectivity has been largely left unprotected. As a result, instructional interruptions are occurring at an alarming rate through...
Subcontracting Under the FAR
Sharpen the skills necessary to understand key issues in subcontracting. This course covers the complex relationships between the federal government, prime contractors and subcontractors. Subcontracting Under the FAR is a must for negotiating and managing subcontracts whether you are a buyer, seller or government official. After completing this course you will understand the role of teaming agreements, contract clause flow-down, consent to sub...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.