Akamai Webcast: Secure Your Infrastruct...
Secure Your Infrastructure from DDoS Attacks Government security organizations must continuously maintain policy compliance, evaluate new cyber threats, and assess risks without impacting operational effectiveness or availability. Akamai offers a broad range of flexible and highly scalable security capabilities to help government organizations extend their defenses out to the edge of the internet and solidify their infrastructure against mass...
Cleared Job Fair
Join us at our June 17, 2010 Cleared Job Fair 11am - 3pm at the Westin Tysons Corner. It's an excellent opportunity for you to meet employers seeking security cleared professionals just like you. Our scheduled employers include CACI, HP, Stanley Associates, Inc., Advanced Concepts, Inc., Dell Perot Systems, Everest Technology Solutions, Invertix Corporation, Raytheon, Unisys, Verizon Federal Network Systems, General Dynamics - IT, L-3 Communic...
B2G Government Contractors Networking
B2G Government Contractors networking event is a monthly recurring event at the J F Kennedy Center, every 3rd Thursday of the month. This is a high-level professional event hosted by Jennifer Schaus & Associates along with MAK Advisors. There is no cost to attend. http://JenniferSchaus3.eventbrite.com
Intelligent Log Management for Governme...
Protect your IT assets and meet FISMA and other regulatory compliance requirements Q1 Labs QRadar delivers intelligent log management and the net result for customers is that threats and frauds that were missed in the past are now detected, physical or virtual. A massive and accurate prioritization of data occurs to make overall security response more effective. The value of intelligence and context goes beyond detection and data reduction be...
Intergraph 2010
Join Intergraph technical experts and industry peers for four exciting days of exclusive technology previews, a showcase of best practices, inspiring keynotes, and unlimited networking. Enter a world of opportunities with Intergraph solutions. Reserve your spot today!
Government I.T. Made Simple--A Study of...
Government I.T. Made Simple...A Study of the Government Case for Security, Virtualization & Storage Agenda: Keynote VIP Guest Speaker: Warren T. Bamford, Special Agent in-Charge (SAC) FBI’s Boston Field Office. IT Security & its’ ‘Happening Now’ impact on the Public Sector to reduce victimization & build security awareness. McAfee: Dave Marcus, Director, Security Research and Communications McAfee Labs McAf...
Making Your Website More Effective: Int...
Making Your Website More Effective: Intro to Proven Usability Techniques Class Format: Two–Day Course Instructor: Hal Miller–Jacobs, UsabilityCoach.com Date: Wednesday – Thursday, February 10 – 11, 2010 Time: 9:00 am – 4:00 pm Place: Department of Labor (DOL) Directions to DOL Fee: $400 federal, state, or local U.S. government; $600 for non–government Course Description Almost anyone can put up a website or...
OMB Changes the Rules of Federal Cybers...
Government Executive and the SANS Institute are partnering to co-produce the Government Executive Cybersecurity Insider Series, monthly expert briefings on pressing cybersecurity issues. These hyper-current events will feature discussions with high-profile federal officials involved in crafting cybersecurity policy and implementation strategies. Government Executive Media Group and the SANS Institute invite you to attend the first of the new s...
Acrobat Webcast: Adobe Solutions for La...
Acrobat Webcast: Adobe Solutions for Law Enforcement Agencies Join Adobe and Carahsoft for an informative webcast to discover how law enforcement agencies across the country are relying on Adobe Acrobat to help with interoperable communications, while cutting down their paper footprint. Through PDF Portfolios, you can utilize Adobe Acrobat Professional as a container of information, giving you the ability to share, comment, and secure multiple...
Cyber Security Summit 2010
This conference will provide you with broad insight and analysis into the complex world of cyber security. Defending against and defeating cyber attacks will require the combined efforts of both the public and private sectors, working to develop new technologies and new approaches for maintaining real-time protection of their individual networks. Hear how executives expect the industry and policies to develop, plus: Find out about the technolo...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.