Kansas City Cybersecurity Conference
The Kansas City Cybersecurity Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You'll come away with advice and knowledge so you can start proactively protecting your environm...
UFC-Minimum Antiterrorism Standards for...
UFC – Minimum Antiterrorism Standards for DOD Buildings (UFC) – This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing the criminal and terrorist threat to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Depar...
Phoenix: ITAR / EAR / OFAC Compliance T...
International Traffic in Arms Regulations (ITAR), Export Administration Regulations (EAR), and Office of Foreign Assets Controls & Embargoes (OFAC) Explained - complete with all Export Control Reform Changes and New Administration Priorities:This seminar series provides both novice and experienced export compliance professionals with a comprehensive education on complying with United States export regulations. We will review recent ECR ch...
CAP (Certified Authorization Profession...
The CAP certification allows you to prove your cybersecurity expertise within the Risk Management Framework (RMF). Take your commitment to cybersecurity assessment and authorization to a new level with the CAP certification. This leading information security certification proves you’re an expert aligning information systems with the Risk Management Framework (RMF).
October 29 - November 1, 2018
Organizer:
Alpine Security Location:
O'Fallon, IL
Using Data To Increase Financial Integrity
This forum seeks to bring together people from the data, analysis, financial, policy and public communities to better understand the challenges and solutions to financial integrity. This forum is looking to provide cases of how using seemingly disparate data led to company or agency success. We want you to imagine the possibilities and provide you with a couple of tools along the way. Keynote Speaker:Suzette Kent, Federal Chief Information Of...
October 31, 2018
Organizer:
ACT-IAC Location:
Washington, DC
Blockchain: A New Approach to Securing...
Blockchain may be best known as the purveyor of bitcoin, but federal managers increasingly are turning to the distributed ledger technology for efficient and secure solutions across a variety of operations and government programs. Blockchain operates as a continuously growing list of records (blocks) that are linked and secured using cryptography. The blockchain creates a distributed ledger that is managed in a decentralized, peer-to-peer way....
Community SANS - SEC560: Network Penetr...
SANS SEC560: Network Penetration Testing and Ethical Hacking, is our flagship course for penetration testing. As a cybersecurity professional, you have a unique responsibility to find and understand your organization's vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? This course fully arms you to address this task head-on. SEC560 is the must have course for every well-rounded security professio...
Desktop Publishing for Proposal Profess...
This workshop teaches valuable skills in designing, laying out, and publishing proposals—presenting your company’s offer in the most professional light to the proposal evaluators. The course begins with a foundation in the tools and features MS Word offers to the desktop publisher, and shortcuts to increase speed and efficiency. The course advances into the selection of color palette and styles, tables of contents, headers and foot...
Certified Ethical Hacker (CEHv10) Certi...
This is the world's most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. When you sign up for this course you have the option to also purchase the CEH Practical exam voucher.
NAFTA Rules of Origin Seminar in Louisville
Seminar Information Are you claiming NAFTA? Learn whether your product should be shipped under the NAFTA Rules. Learn the rules to qualify and classify your goods under the NAFTA Agreement and review in detail the NAFTA Certificate of Origin Document. This seminar prepares a company for shipping into Mexico and Canada under the NAFTA rules, correctly complete and maintain the proper documentation to take advantage of the reduced tariffs under...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.