Back to Search Begin New Search Save Search Auto-Notify
Application Control Security through Wh...
As the threat landscape continues to changes within our financial industry, it is important that the proper precautions are taken to stop attackers and protect our nation’s most crucial financial information. McAfee’s dynamic whitelisting trust model reduces cost by eliminating expensive manual support requirements associated with other whitelisting technologies, and combining continuous detection of system-level changes being made...
May 16, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Federal Media & Marketing Study
Federal Media & Marketing Study 5th Anniversary Breakfast & Briefing Thursday, May 16, 20138:00 a.m. – 10:00 a.m. EST Gannett Conference Center7950 Jones Branch Dr.McLean, VA 22187 Cost: $65 Market Connections and Sara Leiman, VP Media Director at TMP Government, are excited to announce the 5th anniversary release of the Federal Media and Marketing Study. The past year has been one of tremendous uncertainty within the federal gov...
May 16, 2013
Organizer: Market Connections, Inc.
Location: McLean, VA
Add Favorite
Fort Carson Technology Expo
Join NCSI for an In-Agency Technology Expo Fort Carson May 15, 2013 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense, Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base and Central Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors. These compact,...
May 15, 2013
Organizer: National Conference Services, Inc. (NCSI)
Location: Colorado Springs, CO
Add Favorite
Managing Applications from a Top Down P...
APM 360 - Managing Applications from a Top-Down PerspectiveWednesday, May 15, 2013 | 2:00 p.m. - 3:00 pm. EDTThis Webinar will demonstrate how the APM Solution enables IT organizations to: Identify the impact of system and network outages on end users and business services Create consolidated dashboards of mission critical applications, encompassing the network, system, and application performance in a single view Reduce the duration and numbe...
May 15, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Dealing with the Known and Unknown - Wa...
Network battlefields are rapidly facing evolving threat landscapes full of modern applications, exploits, malware, and attack strategies that are capable of avoiding traditional methods of detection. Threats are delivered via applications that dynamically hop ports, use non-standard ports, tunnel within other applications, or hide within proxies, SSL, or other types of encryption.Discover how Palo Alto Networks goes to war through their next-g...
May 15, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Peterson Air Force Base Technology Expo
Join NCSI for an In-Agency Technology Expo Peterson Air Force Base May 14, 2013 Each year NCSI produces over 100 tabletop technology expos at U.S. Department of Defense, Intelligence and Federal Agency locations around the world including the Pentagon, National Security Agency, Ramstein Air Base and Central Intelligence Agency to name just a few. Our technology expos are typically four (4) hours in duration and attract 20 to 50 exhibitors. The...
May 14, 2013
Organizer: National Conference Services, Inc. (NCSI)
Location: Colorado Springs, CO
Add Favorite
Security Controls for Mobile Devices
Mobile devices allow government workers to be more productive and effective; they enable telework and increase employee satisfaction. However, the features that make mobile devices desirable also make them a security challenge. This educational Webinar will examine mobile security challenges faced by government agencies and will reveal how a comprehensive mobile security strategy can help address these challenges.Attend this Webinar and gain i...
May 14, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Writing Persuasive Government Proposals
*This is a two-day event that begins at 9:00am and ends at 5:00pm both days This one-of-a-kind course shows how to develop compliant and highly persuasive proposal sections in at least half the time that it would normally take. It covers detailed methods for outlining within the sections, developing section content, infusing proper structure and flow, and implementing correct writing processes and section planning techniques. But this course r...
May 9-10, 2013
Organizer: OST Global Solutions, Inc.
Location: Rockville, MD
Add Favorite
A CYBERInnovation Briefing on the Presi...
As advanced and persistent cyber attacks threaten our nation’s critical infrastructure, government and industry share a common interest in partnering to stay ahead and protect their assets. However, while they share a common goal, due to the nature of their missions and organizational drivers, their motivations are not always aligned. Earlier this year, President Obama issued an Executive Order focused on cybersecurity that requires the...
May 7, 2013
Organizer: Cyber Incubator and Cync Program at bwtech@UMBC
Location: Baltimore, MD
Add Favorite
Alternative Security to HBSS for Fixed...

CANCELED

Embedded devices and appliances are widely deployed in critical infrastructure today. These include point of care medical modalities (XRay, Ultrasound, CT-Scan, MRI devices in hospitals), ATMs in banks, handheld devices in retail stores, kiosks, critical infrastructure for process control systems or SCADA devices, and storage appliances. In addition, McAfee Embedded Security can be utilized to enforce that the control requirements are met for...
May 1, 2013
Organizer: immixGroup, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search