Data Hub Framework Breakfast Briefing
Are you struggling with multiple disparate data sources? Do you think your organization would benefit if you could easily aggregate data from different sources and different formats? Do you wish there was a way to take your application to the data rather than spend time moving and copying data between applications? If yes, please join us for coffee and breakfast on Tuesday, September 27th to learn about MarkLogic's data hub framework that will...
Optimizing Data Risks in a Virtual World
According to the Government Accountability Office, effective information management for federal computer systems and databases is essential to preventing the loss of resources and forestall the unauthorized or inappropriate use or disclosure of sensitive information. Weaknesses in the management of government information places sensitive data at risk, and agencies are taking steps to protect our nation’s greatest asset and maintain the p...
June 8, 2016
Organizer:
FEDINSIDER Location:
McLean, VA
Adobe Solutions for eLearning & Virtual...
Please join Adobe on Tuesday, May 10th for an interactive seminar on how government agencies are leveraging Adobe solutions to deliver rich and engaging eLearning content. Developing and deploying an eLearning program can be a daunting challenge. Adobe Captivate and Adobe Presenter are powerful eLearning authoring tools used to create rich, engaging student interactions. Adobe Connect delivers this eLearning content through a secure platform,...
NVTC CXO Auction
The NVTC CXO Auction is an exciting event during which regional and industry c-level executives will be auctioned off to raise money for NVTC's Veterans Employment Initiative, which provides tools and resources to match veterans with employment opportunities in Virginia's technology community. During the live auction event, attendees will bid electronically to win one-on-one meetings with c-level leaders. Participating CXOs are looking to meet...
Cyber Insider Threat Training, Instruct...
CANCELED
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
SANS McLean 2016
SANS exceptional cyber security training comes to McLean!We are pleased to invite you to SANS McLean 2016, February 15-20. Are you ready to immerse yourself in the most intense computer training experience available anywhere? Do you need to become a more effective leader when implementing security improvements for your organization? Do you need a more in-depth knowledge of the theory and implementation of computer security, virtualization, or...
James Bond Movie Premier!
You're invited to a screening premier of Spectre, the last James Bond film. A brief presentation prior to the movie will show you how the Quantum approach to storage is different. Shaken, not stirred. Friday, Nov 6 8-11am You must register* to attend. www.quantum.com/jamesbondfed * Only qualified IT professionals will be registered to attend.
Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.