Computer Forensics for the Security Pra...
Accidental/intentional destruction of data, hardware failure or cyber attacks can happen at any time and you may be called upon to respond, investigate, document, handle, and escalate the analysis to a formal investigation. In this two day hands-on workshop, you'll consider when investigations are appropriate or warranted, and learn how and when to recover lost or deleted information from the Recycler Bin (Info2 file), Disk Directory/Master-Fi...
Redstone Arsenal Defense Technology ...
The Redstone Arsenal Defense Technology & Intelligence Career Fair is hosted by Redstone MWR & ACS and produced by Transition Careers. The purpose of this event is to bring job seekers and employers/recruiters within the defense technology, intelligence, scientific, contractor, academic and government communities together. *The career fair is only open to job seekers that already have access onto the military installation (Military ID or CAC C...
GSA & DHS Building
The GSA/DHS Building on 7th and D Street is holding a technology expo for only the second time in 2 years, the first being our expo in June. We will be utilizing the new location in the Cafeteria and Room 5009 on the fifth floor. This building houses the Department of Homeland Security CIO’s Office, the Department of Education CIO’s Office and the GSA Office of Information Security. Sponsored by the GSA’s Center for Information Security Servic...
November 19, 2009
Organizer:
FBC Location:
Washington, DC
Bolling AFB Defense Technology & Intell...
The Bolling AFB Defense Technology & Intelligence Career Fair is produced by Transition Careers. The purpose of this event is to bring together job seekers and employers/recruiters within the defense technology, intelligence, scientific, contractor, academic and government communities. The career fair is only open to job seekers that already have access onto the military installation (Military ID or CAC Card). Transition Careers is not respons...
Federal Webinar: Malware Landscape and...
Malware is changing the way federal agencies deal with security threats to their networks every day. Does malware entering your networks keep you up at night? Do you know what blended threats are, and how they are executed? Jim Beaupre, CEO of FedResults will be hosting a discussion around issues facing federal agencies including "open" government, Gov 2.0, FISMA, FDCC, SCAP and the challenges of providing security in citizen centric applicati...
November 19, 2009
Organizer:
FedResults Location:
Webcast
Washington Breakfast Club™ - "Leveragin...
Washington Breakfast Club™ (WBC) is a monthly information exchange which features legislators, agency executives and officials from all branches of federal government presenting on relevant and timely information to interested industry participants.For the November 2009 WBC we are pleased to welcome our friend Mary Parks of the U.S.General Services Administration who was selected as Deputy Associate Administrator of GSA’s Office of...
Emerging Trends in Crime and Attackers...
The “enemy” in today’s society is able to conduct their intelligence collections and attacks from any cyber-café in the world – miles or oceans away from their target by just using the Internet. Criminal groups have been using online methods and the Internet to further their business operations and goals. Targets of their activities have included US businesses and US government entities. The Internet has opened numerous avenues for perpetrator...
Open Source Tools and Applications for...
The Open Source Tools and Applications for Vulnerability Assessments Workshop will provide you with the training, skills, and resources to use a collection of planning, analysis, and 3D Visualization applications enabling you to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management.
Security Conference & Exhibition
IT Security. It's a national priority that must be at the forefront of every public sector agency's IT infrastructure, plan, and program. From new initiatives like virtualization, cloud computing, and social media to the continued protection of your network and enterprise architecture, all security professionals must develop an expertise in security topics both broad and unique. Find the answers you need for today's ever-changing security clim...
Security 2009 Conference and Exhibition
The Obama Administration has placed Cyber Security as a national priority, as they recognize our increased dependency on cyber space and are committed to developing the policies, processes, people, and technology necessary to diminish cyber security-related risks. They are not only poised to address the current and future threats but are proving their dedication to protecting this domain through the development of a new national strategy for c...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.