Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
Embezzlement (Part 2): Conducting Finan...
Webcast: Conducting any kind of an investigation can be risky. Conducting an investigation that involves people's character, finances and relationships within a family or an employee's workplace is even riskier because it likely changes the lives, careers and relationships among all of the participants forever. Register for this session to learn: --Components of a financial crime investigation; --How to plan a financial crime investigative str...
Anti-Money Laundering: A Guide to the L...
"Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime. The Currency and Foreign Transactions Reporting Act, also known as the Bank Secrecy Act (BSA), and its implementing regulation, 31 CFR 103, is the main regulatory tool the U.S. government uses to fight drug trafficking, money laundering and other crimes....
Making Government and Education Smarter...
Public officials in government and education face more pressure than ever to provide excellent services on increasingly limited budgets. To meet this challenge, your peers and nationally-recognized thought leaders are gathering for a special half-day workshop to learn how information technology can help make your organization smarter, leaner, and greener. By interacting directly with top practitioners, you will gain practical insights that wil...
Practical Transparency: Applying Exchan...
Webinar: The need to collect, exchange and analyze large amounts of data--about health records, environmental measurements and stimulus spending, for example—is transforming the way government works. And in the future, agencies will rely even more on information exchange as a means of accomplishing America’s business. The Environmental Protection Agency is on the forefront of tackling this challenge through the EPA Exchange Network. The networ...
Information Security for Management - W...
Webcast: In most cases, especially in this time of financial crisis, information security should not be the most important issue for a financial institution or government agency -- but if neglected, it will inevitably become a critical factor in the organization's continuing viability. This "Information Security for Management" webinar focuses on helping managers understand the importance and impact of information security on their organizatio...
Pandemic Planning & Response Techniques
Webinar: Think the pandemic threat isn't real, or that you needn't prepare a thorough plan to account for it? Your organization's regulators disagree. Pandemic planning is a significant regulatory requirement for every financial institution and a key component in government agency requirements. Register for this webinar to receive expert advice on: What Regulators Expect From Your Pandemic Plan How Your Organization Can Prevent Or Mitigate A P...
Google Search for Internal Agency Data
Join Google and DLT for a webinar on Monday, December 7 at 2:00pm ET to learn how the Google Search Appliance can index and search your agency’s internal data, improving search ability and efficiency across your organization. Provide your employees with an easy to use and secure search engine to locate data in intranets, web servers, portals, file shares, databases, content management systems, and real-time data in business applications, all w...
Creating a Culture of Security - Top 10...
Webcast: The Obama Administration has a heavy emphasis on information security, and already we're seeing greater attention paid to cybersecurity and FISMA reform. Now is the time for government agencies to benchmark and strengthen their information security programs. Learn from security veteran Patrick Howard, CISO of the Nuclear Regulatory Commission, how to: Develop the Security Program and Policy Manage Security Risks Provide User Awareness...
Leadership Breakfast, Stimulus Program:...
The American Recovery and Reinvestment Act authorized an unprecedented $787 billion in spending by federal agencies to stimulate the ailing U.S. economy. What has happened since? Find out from officials who are charged with getting the money out the door, making sure that spending is accounted for responsibly and transparently, and overseeing the effort from the vantage point of the Government Accountability Office.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.