Managing Applications from a Top Down P...
APM 360 - Managing Applications from a Top-Down PerspectiveWednesday, May 15, 2013 | 2:00 p.m. - 3:00 pm. EDTThis Webinar will demonstrate how the APM Solution enables IT organizations to: Identify the impact of system and network outages on end users and business services Create consolidated dashboards of mission critical applications, encompassing the network, system, and application performance in a single view Reduce the duration and numbe...
Dealing with the Known and Unknown - Wa...
Network battlefields are rapidly facing evolving threat landscapes full of modern applications, exploits, malware, and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications, or hide within proxies, SSL, or other types of encryption.Discover how Palo Alto Networks goes to war through their next-g...
Peterson Air Force Base Technology Expo
Join NCSI for an In-Agency Technology Expo Peterson Air Force Base May 14, 2013 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense, Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base and Central Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors. The...
Security Controls for Mobile Devices
Mobile devices allow government workers to be more productive and effective; they enable telework and increase employee satisfaction. However, the features that make mobile devices desirable also make them a security challenge. This educational Webinar will examine mobile security challenges faced by government agencies and will reveal how a comprehensive mobile security strategy can help address these challenges.Attend this Webinar and gain i...
Writing Persuasive Government Proposals
*This is a two-day event that begins at 9:00am and ends at 5:00pm both days This one-of-a-kind course shows how to develop compliant and highly persuasive proposal sections in at least half the time that it would normally take. It covers detailed methods for outlining within the sections, developing section content, infusing proper structure and flow, and implementing correct writing processes and section planning techniques. But this course r...
A CYBERInnovation Briefing on the Presi...
As advanced and persistent cyber attacks threaten our nation’s critical infrastructure, government and industry share a common interest in partnering to stay ahead and protect their assets. However, while they share a common goal, due to the nature of their missions and organizational drivers, their motivations are not always aligned. Earlier this year, President Obama issued an Executive Order focused on cybersecurity that requires the...
Alternative Security to HBSS for Fixed...
CANCELED
Embedded devices and appliances are widely deployed in critical infrastructure today. These include point of care medical modalities (XRay, Ultrasound, CT-Scan, MRI devices in hospitals), ATMs in banks, handheld devices in retail stores, kiosks, critical infrastructure for process control systems or SCADA devices, and storage appliances. In addition, McAfee Embedded Security can be utilized to enforce that the control requirements are met for...
MacDill Air Force Base Technology Expo
CANCELED
Join NCSI for an In-Agency Technology Expo MacDill Air Force Base April 24, 2013 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense, Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base and Central Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors. Th...
Lessons Learned in the Quest for the Co...
Cyber-security officials in Washington have delivered a clear message to practitioners at every federal agency: radically advance the use of automation to audit, trend and communicate meaningful data about security infrastructure effectiveness. By providing government agencies with powerful automation to continually assess security infrastructure and trend key metrics about their ability to maintain critical asset protection, RedSeal empowers...
Lessons Learned in the Quest for Contin...
Cyber-security officials in Washington have delivered a clear message to practitioners at every federal agency: radically advance the use of automation to audit, trend and communicate meaningful data about security infrastructure effectiveness. By providing government agencies with powerful automation to continually assess security infrastructure and trend key metrics about their ability to maintain critical asset protection, RedSeal empowers...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.