Security Criteria Development: Exceedin...
A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also learn ho...
FireEye On The Frontlines - Tampa
Join FireEye for this informative briefing to learn about: How attackers are targeting US Public Sector entities The latest on cutting-edge cyber threat intelligence, automation of SOC operations, and the latest industry trends in cyber Incident Response New attack groups and the tools, tactics, and procedures they use against their victims, as well as campaigns they have been involved in Recommendations for improving security and steps to tak...
Drive Up Your Command Cyber Readiness I...
Put the Forescout platform through its paces while you learn how to drive up your CCRI Score. During this three-hour, hands-on test drive, you’ll see how your team can gain comprehensive visibility and continuous monitoring of IT, IoT, and OT devices on DoD networks. Experience the before-and-after impact of using the Forescout platform to automate: Asset Management.Improve asset intelligence to automate detection and remediation of endp...
Access Control Concepts and Entry Contr...
Access Control Concepts and Entry Control Facility Design(ECF) – Like the Maintaining Control Workshop conducted by the US Army Surface Deployment and Distribution Traffic Engineering Agency, this class is intended for government, military and contractor SECURITY or ENGINEERING personnel involved in designing entry control facilities. The curriculum focuses on the design features required for the effective and efficient operation of acce...
Inspection and Assessment of Dams
COURSE OBJECTIVES This seminar provides comprehensive instruction in inspection and evaluation techniques for dams. The principles, concepts and procedures taught will be readily adaptable to any organization conducting dam inspections and evaluating their compliance with current design standards. The target audience is state and federal dam owners/regulators, local and private dam owners/operators, consulting engineers and personnel responsib...
Contract Changes, Disputes, and Termina...
Contract changes are inevitable and must be anticipated and properly managed. They can involve everything from the interpretation of the statement of work to the minutes of a meeting. Changes can impact the success of your contract, as well as the relationship between the parties. This seminar will address what constitutes a change, how changes arise, who is authorized to issue and respond to changes (and how to respond), knowing when and how...
NDIA 2016 Defense Systems Acquisition M...
Overview The Defense Systems Acquisition Management course meets the needs of defense industry program managers in today's dynamic environment, providing the latest information related to: Defense acquisition policy for weapons and information technology systems including discussion of the DoD 5000 series (directive, instruction, and guidebook). Defense acquisition and reform and initiatives. Defense acquisition procedures and processes. The P...
MILCOM 2015
MILCOM 2015 celebrates the 34th anniversary of the premier international conference for military communications. “Leveraging Technology – The Joint Imperative” gathers the leading minds of government, military, industry and academia in an interactive forum to further explore and define the benefits that joint-level collaboration bring to current and future communication challenges. The annual conference will take place Octobe...
Global Identity Summit
The Global Identity Summit is the U.S. federal government’s primary outreach and collaboration-building event with the worldwide identity community each year and is designed to: • Promote a high-level understanding of current capabilities, pending needs, and future directions of both the federal government and the identity community. • Initiate and advance public-private and cross-discipline collaboration necessary for the cont...
September 21-24, 2015
Organizer:
AFCEA Location:
Tampa, FL
Vanguard Security & Compliance East 2015
Vanguard Security & Compliance™ is the most advanced cybersecurity educational summit dedicated to IBM®System z®. In 2015, Vanguard Security & Compliance East will feature highly regarded security and compliance experts from around the world. Experts from CA, IBM, Vanguard, and private industry will present the most current information and instruction about cybersecurity threats, protection, configuration and compliance i...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.