Reduce Crime and Mitigate Risks Through...
Today's law enforcement communication technology spans a variety of devices, platforms, and techniques ranging from PCs, laptops, tablets, and a combination of personal and department-issued mobile devices. Voice, text, email, video, and file sharing transmitted internally and externally over these devices are subject to interception, data breach, or exposure long after the useful life of the message. This increases risk for your department a...
NSA 2018 Enterprise Discovery Conferenc...
For the past 41 years, the Federal Business Council has produced thousands of symposiums, expositions, training forums, and conferences, both on-site and off, for the Department of Defense, Intelligence Community, and civilian agencies. 2017 stands to improve upon our schedule, with over 100 events planned.2018 Enterprise Discovery Conference (EDC)-formerly SIGDEV and Exhibition:The Enterprise Discovery Conference is hosted by the National S...
Securing BYOD Communication in the Fede...
Join Carahsoft and Wickr on this informative and educational on-demand webinar to learn how to: Leverage the industry's most robust encryption technology to secure highly sensitive text, voice, file transfer, image, and video communication transmitted over BYOD and government-issued devicesReduce security exposure on mobile devices, even if the device itself falls into the hands of rogue operativesEnable the same level of privacy and securi...
Export Control Recordkeeping and Compli...
BIS issued new export compliance guidelines in 2017 which includes a new section on recordkeeping.The new guidelines include specific requirements for electronic communications and document retention and retrieval. BIS also implies in the new guidelines that a company's export compliance officer should support their organization's efforts to manage the disposal of data storage devices along the lines of the DOC/NIST “Guidelines for Medi...
Discover the Secure Data Protection Pla...
All it takes is 30 minutes to completely revolutionize how you address incorporating advanced security into your data storage. Join Fornetix, Seagate, and RackTop for our on-demand webcast, where you will discover a new network-attached storage solution with encryption and key management built in for data protection. We have partnered to deliver the Secure Data Protection Platform (SDP2) - a simple, unified, and secure data management solution...
Advanced Encryption Classification: Lea...
Advanced Encryption Classification: Learning By Doing Practice Makes Perfect: A Webinar that Combines Hands-On Exercises, Discussions, and Instruction. Participants will receive several case studies/classification exercises in advance of the webinar. The case studies will present data sheets of hypothetical products made for aerospace applications, computing and networking, communications, data security, oil and gas, and medical industries.Thi...
Course On HIPAA and Personal Devices (m...
Overview: This lesson will be going into great detail regarding you practice or business information technology and how it relates to the HIPAA Security Rule, in particular portable devices. Areas covered will be texting, email, encryption, medical messaging, voice data and risk factors as they relate to personal devices. I will uncover myths versus reality as it relates to this very enigmatic law based on over 1000 risk assessments performed...
In the Beginning…An Introduction to Isr...
In the Beginning… An Introduction to Israel’s Dual-Use and Defense Export Control System This webinar is intended to help companies that have operations, affiliates, subsidiaries, customers, suppliers, employees, or facilities in Israel to better understand Israel’s export control system. Israel has a complex export control system that requires companies to navigate a unique export classification system and a multitude of d...
Protect Your Data from Cyber Attacks, R...
View our on demand webcast on protecting agencies from cyber attacks, including ransomware and data breaches. By implementing an encrypted backup policy, organizations can quickly recover from ransomware without paying any ransom. DataLocker offers encrypted portable hard drives that are perfect for an encrypted backup solution. Attendees of this webcast will learn: How data breaches and ransomware impact agencies and what you can do today to...
DIY Encryption Classification 2017 Edit...
DIY Encryption Classification 2017 Edition All registrants receive an encryption classification questionnaire! We are offering a webinar on creating your own encryption questionnaires to use to classify your products. In August, the Bureau of Industry and Security (BIS) significantly changed the Information Security section of the Commerce Control List (Category 5 Part II) as a result of the 2016 Wassenaar Arrangement decision to rewrite cert...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.