Face-to-Face Cloud: Overcoming Barriers...
Federal IT leaders know the benefits cloud computing can provide, from enabling innovation and faster deployment of application to more available, reliable, scalable and flexible operations. Yet despite understanding these benefits and federal mandates that strongly urge the use of cloud computing whenever possible, many agencies aren’t nearly as invested in the cloud as they want to be. Indeed, according to an annual survey of senior fe...
SCA Training
The Service Contract Act is one of the most technically challenging aspects of competing for the award of, and successfully administering a federal service contract. This course is the nation's only SCA training conducted with the Department of Labor Wage and Hour Division, and is designed to help companies navigate the SCA from several different angles. SCA sets minimum pay and benefit rates for many service occupations. Over the past six yea...
FOIA in the Age of [Police] Surveillance
Don't scramble when the time comes. Do you know if police body camera footage is subject to the Freedom of Information Act? The use of video surveillance has dramatically increased in the past few years, both in frequency of its use and the types of technology available. These videos are at the center of public debate and dispute in high profile police investigations, and a large component is the determination of whether to release these video...
NDIA 2016 Defense Systems Acquisition M...
All course materials and handouts will be provided to students on CD ROM. Please bring a laptop computer that is equipped with a CD ROM with you to the class. If you do not have access to a laptop, please contact the respective meeting planner as soon as possible. There will be a limited number of laptops available for use through NDIA, so please call early. Overview The Defense Systems Acquisition Management course meets the needs of defense...
Cyber Insider Threat Training, Instruct...
CANCELED
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
SSL Everywhere
Join F5 Networks and Carahsoft for a deep architectural discussion on SSL/TLS trends, vulnerabilities, mitigations, and best practices of deployment for your mission critical applications. In addition to an overview on SSL trends and recent methods of attacks, we will focus on SSL encryption and decryption for inspecting encrypted traffic. Learn how adversaries increasingly evade cybersecurity tools by using SSL/TLS as a cover of darkness for...
Financing for Government Contractors: A...
Financing a Government Contracting company can have its ups and downs. One good contract can bring in equally good capital, but the periods in-between can force companies to cut corners at their own peril. It’s feast or famine. Join PVBS and Republic Capital Access (RCA) as we explore options and solutions for government contractors in a myriad of situations; start-up government contractors, joint ventures, rapid growth, and payroll fina...
March 24, 2016
Organizer:
PVBS Location:
Webcast
Continuity of Operations (COOP) ...
Continuity of Operations (COOP) & Emergency Planning in the Government Environment Training Workshop XX Executable Response to Catastrophic Challenges and Readily Implementable Solutions This March 2016 Continuity Training Workshop will be the 21st Presentation of this very informative program consistently rated as "Excellent" by previous attendees. Whether you are involved with this year’s CAPSTONE and EAGLE HORIZON national exerci...
Leveraging Hybrid Cloud Architectures t...
Although the National Institute of Standards and Technology (NIST) has defined cloud computing as a model for enabling ubiquitous, convenient, on-demand network access, the variety of technology solutions that are being marketed as cloud offerings is seemingly endless. The Federal government’s unique security requirements and protracted acquisition processes further impede the transformative benefits that many of these technologies have...
March 23, 2016
Organizer:
FEDINSIDER Location:
Webcast
SSL Everywhere
Join F5 Networks and Carahsoft to earn two (ISC)2 CPE credits and discuss how to protect internet users with SSL Intercept technology. Learn how adversaries increasingly evade cybersecurity tools by using SSL/TLS as a cover of darkness for malicious activity and how AirGap Inspection with SSL Intercept technology peels back this cover and revitalizes network perimeter defenses. During this Security TechTalk, you will: Learn about the new Appl...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.