Video Bootcamp
Video Bootcamp Class Format: Two–Day Course Instructor: Michael Rosenblum, Rosenblum TV Date: Tuesday – Wednesday, May 25 – 26, 2010 Time: 9:00 am – 6:00 pm NOTE: the time of this course is LONGER than other two–day WMU courses. Place: Mathematical Association of America Carriage House Conference Center Washington, DCDirections to MAA Fee: $1,950 federal, state, or local U.S. government; $2,925 for non–gover...
The Changing Landscape of International...
Michael J. Penders, Esq., President of Environmental Security International will convene Security and Sustainability Forum's May live webcast from Washington DC on International Standards for Supply Chains and innovations in safety, sustainability, and security. Included in this webcast will be discussions on water and agriculture supply. Large and small businesses in this rapidly growing industry will benefit as Penders brings experts togethe...
Webcast: The Identity Enabled Network:...
As we have seen from recent domestic and global threats, the federal IT enterprise is under constant attack. Today's network access technologies are a starting point for securing federal agency networks, but they are not enough. Today's secure network requires pervasive security measures that leverage existing infrastructure to meet tomorrow's needs - and are rooted in users' fundamental security asset: Their identities. Register for this sess...
Oil Spills, Floods & Terrorists: Emerge...
SSF's webcasts convene panels of current and former federal decision makers to tell you what a government agency is buying and how to position for its security and sustainability grants, contracts and R&D programs.One Katrina-like emergency can strain the resources of government response agencies. Multiply that by three and the Coast Guard, FEMA, Army Corps of Engineers, FBI, and a host of state and local control agencies hit the national...
May 24, 2010
Organizer:
Kim Fletcher Location:
Washington, DC
5th Iraq Aviation & Defense Summit
Since the Iraqi Government gained full responsibility for providing security to Iraqis a year ago, Iraq’s security ministries have been making headways in instilling rule of law across all of Iraq. Officers of Iraq’s security ministries are strengthening security and stability in their land, enhancing their capabilities to deter all threats against Iraq’s sovereignty, security, and territorial integrity.New-Fields Exhibitions...
The 2010 ADFSL Conference on Digital Fo...
Digital forensics is playing a more prominent role in law enforcement, network security, and information assurance. The field of study encompasses not just digital evidence, but also the areas of cyber law, sociology, and security to name a few. Its increasing importance is reflected in its growing role within crime investigations, civil cases and homeland security. An in-depth understanding of digital forensics is needed by college students w...
Advanced Improvised Explosive Devices (IED's)
The Advanced Improvised Explosive Devices workshop is designed to address the growing threat of terrorists’ tactics, techniques and procedures utilizing improvised explosive devices. With the ever present ability to easily acquire materials necessary to construct improvised explosive devices, there is a need to educate and familiarize first responders to the fundamentals of common explosive ordnance, explosive detection systems, CBRNE th...
FAA Mike Monroney Cyber Security Awaren...
This on-site expo will be the part of FAA`s Cyber Security Awareness Training, consisting of one day of break-out sessions and exhibits. Exhibitors will be able to demonstrate their latest information assurance and security products and services. With strong support from the host, FAA`s Office of Information Systems Security, all campus personnel will receive invitations to participate. Exhibitors are encouraged to participate in sessions and...
Maintaining Secure Government Informati...
Join us for a webinar to learn how to effectively support environments that require the highest levels of security, including Common Criteria, STIG, FIPS 140-2 and DCID 6/3. Topics will cover: Industry leading protection with SELinux - a mandatory Access Control System based on collaboration with the National Security Agency User authentication and access control with industry standard management and identity products Ease in automated provisi...
Are You Compliant... and SECURE?
With the announcement of new performance metrics for compliance standards from the OMB, agencies need to move from static, compliance based security to risk management based on real-time monitoring and analysis. Please join Ken Halley of Symantec and The Winvale Group for a complimentary webinar to learn how Symantec’s Risk Automation Suite (formerly SecureFusion) can enable automated and integrated vulnerability management. You will al...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.