How to Solve Identity and Access Manage...
This complimentary online webcast is sponsored by Federal Computer Week and Centrify. Is your agency making it easier for employees to access data anytime, from anywhere? How secure is your cloud? Learn about identity management in today’s federal environment and why it’s important to centralize identities and unify access management for cloud security and data consolidation. This webcast will address trends, progress, and best pra...
How to Win the Battle for Network Security
This complimentary online webinar is provided on behalf of Sourcefire and GovPlace. Today’s networks are highly dynamic. New technologies add complexity, and the number and type of applications and systems on your network continues to grow. Information security risks multiply in number and scale as attackers become more sophisticated—and stealthy. Sourcefire Next-Generation IPS raises the bar for IPS technology by integrating real-...
Dive Deeper - Gain Unprecedented Visibi...
This complimentary online webinar is provided on behalf of McAfee and Solera. Today’s threats are highly dynamic, constantly morphing and persistently attacking our information assets. Astute organizations understand the need to balance resources between aggressive prevention and complete detection for swift incident response. The best-in-class McAfee Network Security Platform—combined with Network Security Analytics from Solera Ne...
To What Extent is Iran a Threat to Israel?
INTERNATIONAL COUNCIL FOR MIDDLE EAST STUDIES Presents To What Extent is Iran a Threat to Israel? Is Military Intervention by Israel and/or the West Probable? Join Trita Parsi and Ehud Eilam for a discussion of these vital questions. Wednesday, February 29, 2012 4:00 – 6:00 p.m. International Council for Middle East Studies 1055 Thomas Jefferson Street, NW Suite M100 Washington, DC 20007 (202) 315-8680 Light refreshment served R.S.V.P....
No More Breaches: Next Generation Data...
This complimentary webinar is provided on behalf of McAfee and ISM. Cloud. Virtualization. Databases. Visibility. All of these present unique security challenges to traditional data centers. In today’s environment, data centers must be optimally available, flexible, resilient, and secure. The traditional approach to security compromises their primary intent—robust and uninterrupted service delivery. While a reactive approach has wo...
Secure Remote Support for the Mobile Agency
This complimentary online webinar is provided on behalf of Bomgar. Agencies have used remote access to support their employees for decades. However, the point-to-point solutions first used to support the LAN have failed to address key security requirements of an Internet-centric world. In fact, for several years, remote access has been found to be the leading attack pathway for hackers – in some studies, implicated in more data breaches...
Database Breaches - Are Your Customers...
This complimentary online webinar is provided on behalf of McAfee. Recent studies conducted by both Verizon Business and Forrester Research indicate that 15% of enterprises and government agencies do not employ any security measures to protect the data residing in their databases. Additionally, more than 70% of enterprises and government agencies do not, or cannot, patch their databases, leaving them vulnerable to attacks. Learn how to help yo...
Degauss It or Risk It Webinar on Data D...
Join us for a Webinar on January 26! Attend our FREE webinar to learn more about the technology used by the FBI, NSA and CIA to quickly and safely destroy sensitive data. Hard drives and data tapes store your secrets: sensitive data you would not want to fall into the wrong hands. Our state-of-the-art degausser can kill up to 1,800 hard drives or tapes an hour. It is so powerful, it meets tough National Security Agency and Department of Defen...
Building a Successful Self-Defense agai...
This complimentary online webinar is provided on behalf of HB Gary. The APT (Advanced Persistent Threat) has become an umbrella term that conjures up fear and is often positioned as an unwinnable battle of wills for access to a network. Yet upon closer inspection, the telltale artifacts of a highly adaptable adversary would appear not to be advanced at all. In fact, this is a fight that organizations can win on their own without having elite h...
FREE Feith DC BPM & Workflow Workshop,...
A Free Feith Event: "Realize Your Workflow Vision: Learn How Organizations Like Yours Have Already" Topics include: BPM & Workflow, Managed Content & ECM, DoD 5015.2 Certified RMA, Legacy Integration, Simplified Web Forms, and more. ONE DAY ONLY: November 29th, 830am (Registration), 9am (Workshop). WHERE: Hyatt Regency Capitol Hill: 400 New Jersey Ave NW, Washington DC. COST: FREE. INFO: Please direct all inquiries to: events@feith.com...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.