ICE Audits - What All Employers Should Fear?
In this webinar, I will discuss the importance of being ready for a Notice of Inspection (NOI) - also referred to as audit by Immigration and Customs Enforcement (ICE), what happens when an ICE audit occurs, and an employer’s potential liability for I-9 errors discovered by ICE in the audit. The webinar will discuss the need for preventive maintenance – an employer performing an internal I-9 audit - which should discover many of th...
Impact & Control of RFIs on Constructio...
This construction project management training discusses the genesis of RFIs and their development and discusses the impact of RFIs on construction projects, drawing upon data provided by ACONEX and other studies to assess how RFIs and the RFI processes impact both small large scale construction projects. It will also address the abuse of the RFI process examining how some contractors misuse RFIs to increase profitability, a practice that has b...
Cybersecurity Leadership and Governance
The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance The word cybersecurity is thrown around, used and abused to scare people into buying...
Corporate Gray Military-Friendly Job Fair
This Corporate Gray Military-Friendly Job Fair allows transitioning and former military personnel and civilians the opportunity to meet face-to-face with employers seeking candidates with military experience. Event is free to all Job Seekers. This event is held at the Waterford Reception Center in Springfield, Virginia, 9:00 am to 12:30 pm. Free employment seminar at 8:00 am.
CIO Government Technology Conference
The CIO Government Technology will bring together leading CIOs, CISOs, and government IT executives from across the U.S. to confront and overcome current industry issues, cybersecurity, and cloud computing. This event will explore critical topics and challenges currently impacting government agencies, and emerging technologies that will resolve the issues. The goal of the CIO Government Technology Conference is to create an environment...
Cybersecurity Leadership and Governance
Scope: The goal for this course is to provide an understanding of cybersecurity leadership focused on people and not just technology and policy. It will give you an overview of frameworks to support your risk management activities. It is highly useful to any organizational executive, or leader seeking an understanding of building cybersecurity cultures and governance. Delivery: Live Online Instructor Led Session in a Virtual Classroom Purpose:...
API Security
A short video that highlights Peach API Security including integration into application and web development continuous improvement process and OWASP Top 10, PCI 6.5 and fuzzing
Introduction to Peach Fuzzer and Fuzzin...
An on-demand webinar that introduces Peach Fuzzer and overviews our fuzzing technology. Peach Fuzzer is an automated security testing platform that finds unknown vulnerabilities in software & hardware systems, IoT & embedded devices. We help identify unknown vulnerabilities so you can close them and help prevent zero-day attacks.
Denver Federal Center Technology Day
For the past 40 years, the Federal Business Council has produced thousands of symposiums, expositions, training forums, and conferences, both on-site and off, for the Department of Defense, Intelligence Community, and civilian agencies. FBC invites you to exhibit at the Denver Federal Center (DFC), home to over 6200 federal employees from 28 agencies, making this the largest concentration of Federal agencies outside of Washington, DC. There ar...
Infoblox Breakfast
We will be covering security’s most important topics and discussing today’s largest DNS Attacks. Arguably, the most destructive cyberattacks use DNS — stealing computing power, exfiltrating sensitive information, holding files and devices for ransom, and causing severe destruction of critical services. DNS servers are essential, so they are a primary vector for cyberattacks. Join us for breakfast to discuss: Real-time insigh...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.