Back to Search Begin New Search Save Search Auto-Notify
Minimize Risk and Strengthen Compliance...
In today’s volatile and complex digital environment, it’s essential that growing agencies maximize efficiency and security when exchanging critical data. IBM Sterling File Gateway enables the consolidation of disparate file transfer activity in any format, protocol, and file size. Are you constantly adding trading partners and experiencing difficulty accommodating their on-boarding requirements? If so, we invite you to join us for...
December 10, 2015
Organizer: IBM Government at ESVA Inc.
Location: Webcast
Add Favorite
IT Security, Cloud Computing, and Expor...
Is your company prepared for accidental exports resulting from cyber-attacks? Amidst news of high profile cyber-attacks against the US government and private company networks, regulators at the Bureau of Industry & Security (BIS) and the State Department are beginning to connect the dots between data security and export controls. This webinar will explore the interconnections between export compliance and network security. We will help bot...
October 29, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
DIY Encryption Classification 2015 Edition
Create effective tools to make your encryption classification easier! The Export Compliance Training Institute is offering a webinar on creating your own encryption questionnaires to use to classify your products. Participants will receive an encryption classification questionnaire template from the instructor, Felice Laird, and will be guided through the template and coached on how to customize it for their companies in light of the changes i...
September 17, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
CJIS Compliance with Google Apps
CJIS Compliance with Google Apps FBI mandated CJIS compliance is rapidly becoming a top priority for law enforcement and government agencies of all sizes. Compliance can be tricky, but Google can offer the closest thing to guarantee compliance without breaking the bank. Please join Google, Virtru, and Carahsoft for a complimentary webcast on Wednesday, September 2nd to learn more about the CJIS compliance. By utilizing strong, 256-bit, end-to-...
September 2, 2015
Organizer: Google Government Team at Carahsoft Technology Corp.
Location: Webcast
Add Favorite
Encryption and Cybersecurity Export Reg...
BIS relaxes rules while proposing a wide range of new controls on “cybersecurity” products. This webinar will bring companies up to date on the latest regulations affecting exporters of products using encryption as well as discussing new and proposed rules on cyber security products. These new rules are a result of agreements made by the Wassenaar Arrangement in the past two years, as well as an ongoing US interagency review of cyb...
June 25, 2015
Organizer: Export Compliance Training Institute
Location: Webcast
Add Favorite
DHS/SRI Infosec Technology Transition C...
The Department of Homeland Security (DHS) Science & Technology (S&T) Directorate ITTC event will take place on Thursday June 11, 2015, from 1:30 p.m. to 5:30 p.m. at SRI International in Menlo Park, CA. This program will be followed by a networking reception from 5:30 p.m. to 7:30 p.m. This series of meetings has developed a following of IT security professionals from the Federal Government, private industry, law enforcement, venture c...
June 11, 2015
Organizer: Department of Homeland Security
Location: Menlo Park, CA
Add Favorite
Securing Self-Encrypting Drives
Securing something that is inherently secure is not superfluous. Self-encrypting drives play an integral role in protecting data at rest. These drives utilize hardware-based encryption to protect all data stored on the drive. The encryption process generates encryption keys which are used to lock and unlock the data. These keys are generally stored on a server that multiple people can access leaving them vulnerable to being lost, corrupted, or...
March 26, 2015
Organizer: SafeNet Government Team at Carahsoft
Location: Webcast
Add Favorite
Insider Threat Protection at the Point of Use
Traditional security products like antivirus, VPN, and disk encryption have a major weakness: they stop working when the user views your data. Your employees work in the real world where laptops, tablets, virtual desktops, and open offices put your data at risk to threats that can’t be detected or prevented by conventional tools. Mobile devices and insiders are responsible for the majority of data breaches in the US. Why, after years of...
March 10, 2015
Organizer: Oculis Labs Government Team at Carahsoft
Location: Webcast
Add Favorite
F5 Air Force TechTalk: Cybersecurity fo...
Earn (ISC)2 CPE credits and have a discussion on denial-of-serivce attacks, application security, and traffic inspection Join F5 Networks, VMware, CDWG, and Carahsoft to discuss how to operationalize application cybersecurity protections and L4-L7 services necessary to meet the performance, security and reliability demands of Air Force applications in a JIE environment. Learn how increase security, reduce complexity, and help the Air Force to...
February 26, 2015
Organizer: F5 Government Team at Carahsoft Technology Corp.
Location: Lackland AFB, TX
Add Favorite
ICISSP 2015
The International Conference on Information Systems Security and Privacy aims at creating a meeting point for researchers and practitioners that address security and privacy challenges that concern information systems, especially in organizations, including not only technological issues but also social issues. The conference welcomes papers of either practical or theoretical nature, presenting research or applications addressing all aspects of...
February 9-11, 2015
Organizer: ITSTICC
Location: Angers, FR
Add Favorite
Back to Search Begin New Search