66 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
IBM Security Suite Proof of Technology
Your organization is producing more data than ever before, and it’s being shared faster and more widely than in the past. Additionally, those who are looking to steal that data are becoming more sophisticated and stealthy, creating an era of continuous breaches. We invite you to join us for a complimentary, one-day session where we will help take your organization's security to the next level. This hands-on session will focus on IBM QRad...
June 18, 2015
Organizer: ESVA, Inc.
Location: McLean, VA
Add Favorite
Data Security Webcast: Defending Agains...
Rogue nations, hackers and organized crime are the cyber villains that everybody loves to hate... But in a 2014 survey, the most-cited cause of data theft was employees. Yet employees are not the only source of insider threats. Trusted third parties with access to networks and data, including current and former service providers, consultants and contractors are also major sources of data theft. Data Theft Prevention (DTP) ---------------------...
June 3, 2015
Organizer: Websense, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
March 26, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
OHSA Update – What You Need To Know
OSHA Update - What You Need To Know You're Invited - Richmond, VA 3/11/15 J. J. Keller Safety Management Education Seminar Join J. J. Keller experts Sr. Workplace Safety Editor, Travis Rhoden, and Account Executive, Jeff Jordan, at this complimentary seminar as they provide an executive overview on the latest OSHA regulatory changes! Updates include the new GHS labeling standards, Hazcom, Injury & Illness prevention (I2P2), record-keeping...
March 11, 2015
Organizer: J.J. Keller & Associates, Inc.
Location: Richmond, VA
Add Favorite
Hours of Service & Vehicle Compliance Update
Hours of Service & Vehicle Compliance Richmond, VA 3/10/15 - J. J. Keller Safety Education Seminar You're cordially invited to join J. J. Keller for a no-cost informative seminar on the Hours of Service regulations including changes to the 34 restart, MAP-21 Transportation Bill, the latest news on the ELD proposal and pending mandate,CSA impact on driver fatigue scores, SMS changes, electronic logs, vehicle compliance & inspection requ...
March 10, 2015
Organizer: J.J. Keller & Associates, Inc.
Location: Richmond, VA
Add Favorite
NRO IT Planning Conference
The National Reconnaissance Office (NRO) is hosting their 4th Annual Information Technology Planning Conference (ITPC) and Technology Exposition and will take place in Chantilly, VA on October 29 and 30, 2014. The NRO ITPC is an annual event designed for the collection of user needs and gaps and offers a venue for informal dialogue between NRO Directorates and Offices (D & O) and CIO architecture and sub-portfolio managers responsible for...
October 29-30, 2014
Organizer: Federal Business Council, Inc.
Location: Chantilly, VA
Add Favorite
Back to Search Begin New Search