AFFIRM December Luncheon - Web 2.0 at W...
Like Elizabeth Taylor and Richard Burton, there's a love/hate relationship between our government and Web 2.0. It's on again, it's off again, it's on again...Well, given productivity and security/privacy concerns, govies are never going to spend all day hanging out on facebook. But that doesn't mean that Web 2.0 does not have an important role to play in government. A series of agencies are building out Web 2.0 communities inside the firewall...
December 15, 2009
Organizer:
AFFIRM Location:
Virtual
Pentagon Defense Technology & Intellige...
The Pentagon Defense Technology & Intelligence Career Fair is produced by Transition Careers. The purpose of this event is to bring together job seekers and employers/recruiters within the defense technology, intelligence, scientific, contractor, academic and government communities. The event is only open to job seekers that already have access onto The Pentagon(Pentagon Military ID or CAC Card). Transition Careers is not responsible for job s...
Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
Embezzlement (Part 2): Conducting Finan...
Webcast: Conducting any kind of an investigation can be risky. Conducting an investigation that involves people's character, finances and relationships within a family or an employee's workplace is even riskier because it likely changes the lives, careers and relationships among all of the participants forever. Register for this session to learn: --Components of a financial crime investigation; --How to plan a financial crime investigative str...
Anti-Money Laundering: A Guide to the L...
"Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime. The Currency and Foreign Transactions Reporting Act, also known as the Bank Secrecy Act (BSA), and its implementing regulation, 31 CFR 103, is the main regulatory tool the U.S. government uses to fight drug trafficking, money laundering and other crimes....
BIBA
BIBA is a conference. It's more than that though. It's a place for big brains to explore big ideas and plan for big actions.You can attend, but you must share ideas and plan for doing something that matters. The participants at BIBA will help you build something new, or refresh something old.You will leave excited, invigorated and connected to a group of people that will support your .com, .gov and/or .org initiative.
December 11, 2009
Organizer:
FedScoop Location:
Washington, DC
For Government Contractors Only
If you do business in support of government agency requirements you should plan to attend For Government Contractors Only, a new edition of Business Over Breakfast™, the most productive government sector networking breakfast event in DC/MD/VA exclusively for B2G and B2B2G companies. For Government Contractors Only is a sister-activity of the weekly event that started more than fourteen years ago by Navy and Marine Veterans doing business...
4th Iraq Aviation and Defense Summit (IADS)
The 4th Iraq Aviation and Defense Summit -- On its fourth year, the Iraq Aviation and Defense Summit (IADS) is the world's largest and most respected event focused on Iraq’s aviation, security, and defense challenges and opportunities. IADS is the only event where you will hear from those who are responsible for shaping the future of Iraq’s aviation and defense. For three consecutive years, IADS has featured senior ranking Iraqi military offic...
ISS World Asia - Pacific
ISS World Asia Pacific is the world's largest gathering of Asia Pacific Telecom Operators, Law Enforcement, Intelligence and Defense Analysts responsible for lawful interception, electronic investigations and network Intelligence gathering. ISS World Programs present the methodologies and tools to bridge the chasms from lawful intercept data gathering to information creation to investigator knowledge to actionable intelligence.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.