GCN Awards Gala
Tickets Now Available! Join us on October 14th for the 28th Annual GCN Awards Gala at The Ritz-Carlton, Tysons Corner. Be there as we recognize the outstanding achievement of federal and state & local teams, who are working at a time when demands for high performance, security and a clear return on investment have never been greater. Your attendance at the 2015 GCN Awards Gala would not only show your support for these achievements, but al...
3rd Annual Tysons Cyber Security Summit...
On October 1, 2015, the Tysons Regional Chamber will host its Third Annual Tysons Cyber Security Summit. Open to anyone who owns or operates a business, the chamber invites you to be a part of this unique event as it welcomes business leaders and technology experts from around the area to speak on our powerhouse panel. These respected leaders in Cyber Security will discuss four areas of concern for small, medium and large businesses. What are...
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Cyberattacks: 360 Degree View
THIS BRIEFING IS FOR SYSTEMS INTEGRATORS, GOVERNMENT AND MEDIA. In America and indeed across the globe, cyberattacks have risen to be a top national issue, with cyber-threat crossing the line to perpetuating violence in real life. Hacker groups, criminal organizations, and espionage units worldwide have access to powerful, evolving capabilities, which they use to identify, target, and attack. Government plays a pivotal role in maintaining the...
May 19, 2015
Organizer:
FedInsider Location:
McLean, VA
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Quantum invites you to opening day of I...
I N T E R S T E L L A R brings science fiction and space travel to the big screen with an all-star cast and a noble goal: to save humanity.Being science fiction fans, the team at Quantum is proud to invite you to this exclusive movie premiere event for IT professionals. Before the movie, you'll hear briefly how we are committed to help our customers change the world, every day.Quantum is a leading expert in scale-out storage, archive and data...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.