2019 Cyber Security Brainstorm
Today’s cyber landscape can feel like the Wild West for government IT leaders. Endless cloud filled skies, open landscapes, perimeter free endpoints – a cyber frontier vulnerable to attack from all sides. To stay strong in this frontier, agencies need to establish new security functions and implement zero-trust models to combat the threats lingering outside the perimeter. Traverse the new cyber terrain with MeriTalk for an insightf...
August 8, 2019
Organizer:
MeriTalk Location:
Washington, DC
Sensitive Compartmented Information Fac...
After attending this unclassified class, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent eav...
NAFTA Rules of Origin Seminar in Orlando
Seminar Information: Are you claiming NAFTA? Learn whether your product should be shipped under the NAFTA Rules. Learn the rules to qualify and classify your goods under the NAFTA Agreement and review in detail the NAFTA Certificate of Origin Document. This seminar prepares a company for shipping into Mexico and Canada under the NAFTA rules, correctly complete and maintain the proper documentation to take advantage of the reduced tariffs under...
FCW Summit: Cybersecurity
Cybersecurity consistently tops the list of concerns that federal and state and local executives face every day. It affects their spending and their hiring. It is a major undertaking, shifting from a security paradigm focused on perimeter defense to a network-, application- and data-level security that’s inextricably enmeshed in the network. Among the challenges, agencies must determine how much of the lift they will shoulder and how muc...
Risk Management and Internal Controls -...
The United States federal government is rich in data; from public safety to health to agriculture to housing, data is abundant. With widespread access to the internet, demand and availability of data both inside and outside the government has grown in the last decade, fueling more demand for data and a host of questions about what can be learned to help agency internal controls and risk management activities, and what the future of data should...
Primer on Identity and Access Managemen...
Gartner defines identity and access management (IAM) as “the security discipline that enables the right individuals to access the right information at the right times for the right reasons.” At the heart of the biggest data breaches of all time, those involving commercial firms like Target, Home Depot, and Yahoo, are stolen credentials. Other risks include improperly shared credentials and misuse by disgruntled employees. This webi...
August 7, 2019
Organizer:
FEDINSIDER Location:
Webcast
Drive Up Your Command Cyber Readiness I...
Put the Forescout platform through its paces while you learn how to drive up your CCRI Score. During this three-hour, hands-on test drive, you’ll see how your team can gain comprehensive visibility and continuous monitoring of IT, IoT, and OT devices on DoD networks. Experience the before-and-after impact of using the Forescout platform to automate: Asset Management.Improve asset intelligence to automate detection and remediation of endp...
Tariff Classification Seminar in Orlando
Seminar Information: This class is for importers and exporters. The classification and valuation of goods must be done correctly for a successful international trade transaction. If you classify or value your products incorrectly, your shipment may not reach its destination, and/or you may be subjected to severe penalties. You will also learn how to determine whether goods are subject to quotas, restraints, embargoes or other restrictions. Thi...
Drive Up Your Command Cyber Readiness I...
Put the Forescout platform through its paces while you learn how to drive up your CCRI Score. During this three-hour, hands-on test drive, you’ll see how your team can gain comprehensive visibility and continuous monitoring of IT, IoT, and OT devices on DoD networks. Experience the before-and-after impact of using the Forescout platform to automate: Asset Management.Improve asset intelligence to automate detection and remediation of endp...
Cybersecurity Technical Excellence Event
"How can we implement a holistic approach to cybersecurity?" "What methodologies, policies, technologies, and specific tools can we deploy to prevent, detect and monitor cybersecurity threats"? "How can we build a more effective program?" As more data breaches are disclosed, cybersecurity is at the forefront of Boards, executives, employees and consumers. Breaches are a continuing threat to an organization's reputation through the disclosure o...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.