Back to Search Begin New Search Save Search Auto-Notify
3rd Annual San Diego Regional Security...
The 3rd annual "C4ISR, CyberSecurity, Robot Platforms & Sensors Conference" will be held Sep. 14 & 15, 2010. The San Diego Chapter of ISSA holds its annual Security Conference on Sep. 14 in conjunction with The Security Network. The Mission of The Security Network is to advance security by “Fostering Innovation through Collaboration” worldwide. The non-profit, non-partisan The Security Network promotes rapid commercializati...
September 14-15, 2010
Organizer: The Security Network
Location: San Diego, CA
Add Favorite
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
September 14-15, 2010
Organizer: Environmental Resource Center
Location: Minneapolis, MN
Add Favorite
Hazardous Waste Management: The Complet...
If your facility generates hazardous waste, you must comply with detailed regulatory requirements for waste characterization, container marking and labeling, waste minimization, manifesting, transportation, emergency response, and land disposal certification. EPA and state regulations require annual hazardous waste management training. At this two-day class you will learn the latest requirements of the law and how to comply. This course will t...
September 14-15, 2010
Organizer: Environmental Resource Center
Location: Pittsburgh, PA
Add Favorite
How to Ship Consumer Commodities and Li...
Consumer commodities (ORM-D) and limited quantities are subject to somewhat less stringent regulations than other hazardous materials. However, this does not mean that DOT doesn't regulate them. And when you ship them by air, they are subject to more stringent regulations established by IATA and ICAO. Regulatory relief is also granted to sample shipments, materials that are transported by private motor carriers in support of a business, and sm...
September 14, 2010
Organizer: Environmental Resource Center
Location: Webcast
Add Favorite
Government IT Security: Emerging Threat...
Join us for an informative technology symposium at the beautiful JJ Moakley Courthouse, in the heart of Boston's waterfront Seaport District. Learn how your organization can achieve enterprise-wide security with centralized management and complete visibility. Today's threats touch every area of the Enterprise - from email, to endpoints, to web gateways to servers. As attackers are adopting new techniques, the technology required to protect ou...
September 8, 2010
Organizer: En Pointe GOV, Inc. & Symantec
Location: Boston, MA
Add Favorite
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
August 16-19, 2010
Organizer: Government Training Inc.
Location: San Diego, CA
Add Favorite
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
August 2-3, 2010
Organizer: Government Training Inc.
Location: Las Vegas, NV
Add Favorite
How to Protect Your Systems, Inside and...
July 26, 2010
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Proven Strategies to Defend Your Data
In the fall of 2008, the Commander of the U.S. Strategic Command, responsible for the Department of Defense’s Global Information Grid (GIG) realized there was a problem with how its many and diverse users were unwittingly introducing malware into the department’s closed networks. The scope of the problem was significant, as the GIG comprises more than 15,000 local and regional area networks, engaging approximately seven million com...
July 20, 2010
Organizer: 1105 Government Information Group
Location: Washington, DC
Add Favorite
Regional Collaboration in Cybersecurity...
The National Defense University’s Information Resources Management College (NDU iCollege) will be holding its 1st International Conference at the Shangri-La Hotel in Singapore July 13-14, 2010. The title of this event - “Regional Collaboration in Cybersecurity: Securing the Cloud, Web, and Virtual Networks” – brings together key components of today’s technology while answering the challenge of information security...
July 13-14, 2010
Organizer: National Defense Univ & National Univ of Singapore
Location: Singapore, SG
Add Favorite
Back to Search Begin New Search