NCI's Initiative for Women in Cybersecu...
In July 2015 and as part of the NCI’s IWICS, Dr. Jane LeClair hosted Danyetta Fleming Magana. Mrs. Magana founded Covenant Security Solutions in 2003. Her goal is to stretch the envelope for how we think about our information and find new and innovative ways to secure our way of life in digital form. She is a Certified Information Systems Security Professional (CISSP) a globally recognized certification in the information security arena.
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Empower YOUR Business - How recent brea...
Danyetta Fleming Magana, CEO of Covenant Security Solutions and Janice D. Pryor, Director of CyberSecurity Training for Covenant discuss the latest trends in CyberSecurity including lessons learned and future impact of the OPM and Ashley Madison Breaches among others. Learn how these high profile breaches are affecting regulators and lawmakers and ultimately your business. Tune in to learn what you can do today to prepare your CyberSecurity po...
Corporate Gray Military-Friendly Job Fair
This Corporate Gray Job Fair for the Military Community allows companies the opportunity to meet face-to-face with transitioning/former military personnel and civilians. Free to all Job Seekers. This event is held at the Waterford Reception Center in Springfield, Virginia, 9:00 am to 12:30 pm. Free employment seminars at 8:00 am.
2015 NSA-DHS-NIST Cybersecurity Innovat...
The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, and planned with the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing. The technical p...
ComDef 2015
Developing Capability, Improving Readiness - Register Here! Building on the successful ComDef 2014, where 38 nations participated with the United States in a lively and informative presentation and Q&A format, ComDef returns to Washington, DC to provide further insight, discussions and networking for government, military, academia and industry with an industrial base emphasis. The goals for the upcoming ComDef are as follows:- Understand h...
September 9, 2015
Organizer:
IDEEA, Inc. Location:
Washington, DC
Fort Belvoir Mission Solutions Showcase
Join NCSI for an In-Agency Event Fort Belvoir Mission Solutions Showcase September 8, 2015 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to...
Fort Meade Technology Expo
Join NCSI for an In-Agency Event Fort Meade Technology Expo September 3, 2015 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense and Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base, and the Defense Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitor...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Next-Generation, In-Memory Technology:...
Have you reached a tipping point where the risk and cost of staying with the status quo outweighs the benefits? Federal IT spending is dramatically declining, from a peak of $80 billion in 2010 to $70 billion in the 2014 fiscal year, with even more reductions on the way. It's become more important than ever for your organization to dramatically reduce costs and improve performance outcomes - a tricky balance in today's stressed environment. Wi...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.