Satisfying Privacy Requirements in a So...
To a social engineer intent on extracting data, the modern office reads like an open book. Over-the-shoulder reconnaissance reveals what is available, where it is, and who has access to it – all the ingredients an adversary needs to succeed at a data breach. Organizations that focus exclusively on network security may keep out external attackers, but that’s not enough to prevent insider-driven breaches. Studies of security breaches...
Make Sense of Social Media with InTTENS...
Over 2.1 billion internet users now have a voice through social media. There are 300-500 million tweets that go through Twitter each day, 800 million active Facebook users, and over 75 million discussion boards and online forums exist. If your organization is struggling to aggregate all this content and handle the immense volume of social media, then it is important for you to learn how to make sense of and better interact with social media us...
Accelerate Business Services in the Cloud
Providing Agility and Mission Velocity at Light Speed While the primary motivation for cloud computing among government agencies is cost reduction, the larger discussion should be about using this new paradigm to accelerate your mission and provide services at light speed. If you are considering using the cloud, one fundamental question you should ask is how fast your cloud can move. The answer depends on how the cloud is built and whether it...
Combatting Advanced Persistent Threats:...
Years ago, the U.S. Air Force coined the term "Advanced Persistent Threats" (APTs). Today, it is becoming one of the most talked about, inconsistently defined, and abused terms in security. Yet APTs are real threats that federal government and enterprise IT teams must combat because their sophisticated attacks have serious consequences. Please join Daniel Teal, founder and CTO of CoreTrace, and a former information warfare officer at the Air F...
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
Securely Connecting Health Communities...
What to know and how to start... A soldier will receive medical attention from many military hospitals and clinics throughout his or her career. Meanwhile, family members back home may be treated for injuries or illnesses by their local physicians. With treatment received by many different healthcare providers over the course of several years, how will each family member’s health records be accurately maintained and protected? Will they...
Manage Applications with Ease and Mitig...
Session 1:Date: Wednesday, June 13, 2012Time: 2pm Eastern; 11am PacificDuration: 1 HourSession 2:Date: Thursday, June 14, 2012Time: 2pm Eastern; 11am PacificDuration: 1 Hour Session 1: Performance Testing and Monitoring Join this one-hour webinar to learn how to uncover subtle performance issues in your web-based application using HP LoadRunner and SiteScope. The challenges of creating actionable results that show end-user response time correl...
Protect Access to Cloud-Based Applicati...
Multi-factor authentication – whether through the use of one-time password (OTP) tokens, certificates, USB tokens, or smart cards – has grown increasingly critical as organizations look to secure remote users’ access to sensitive data. As enterprises move increasingly strategic services to the cloud, security teams will need to leverage centralized mechanisms that accommodate both traditional remote access scenarios and cloud...
Second Annual Citizen Engagement Seminar
This year's citizen engagement seminar promises to continue the discussion on the power of citizens' online experience while delivering new and exciting insights into how agencies are overcoming communication challenges.Join us on Tuesday, June 12th from 8am - 2pm at the Grand Hyatt in Washington, DC to learn how Carahsoft's Citizen Engagement Solutions can help your organization: Analyze current websites and how citizens interact with, and ex...
Backup and Recovery Solutions Optimized...
EMC Webcast:Backup and Recovery Solutions Optimized for VMware Virtualization gives IT the flexibility to address the unique challenges presented by mission-critical applications and data growth. To harness the benefits of this dynamic computing environment while providing reliable data protection, you need a backup-and-recovery solution that is optimized for VMware. Traditional backup and recovery can't keep up with the increased demands of v...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.