Bridging The Great Minority Cybersecuri...
Cybersecurity has been identified as one of the most serious economic and national security challenges we face as a nation. Sadly however, there is global underrepresentation of women and other historically underrepresented minority groups (African Americans and Hispanics) in the fast-growing discipline of cybersecurity in the United States of America. "Grassroot Efforts” to increase the number of minority students pursuing cybersecurity...
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer:
FEDINSIDER Location:
Webcast
GTRA SecureGOV Council Summit
Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issue...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer:
SecureAuth Location:
Chicago, IL
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer:
SecureAuth Location:
Costa Mesa, CA
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 10, 2015
Organizer:
SecureAuth Location:
Palo Alto, CA
James Bond Movie Premier!
You're invited to a screening premier of Spectre, the last James Bond film. A brief presentation prior to the movie will show you how the Quantum approach to storage is different. Shaken, not stirred. Friday, Nov 6 8-11am You must register* to attend. www.quantum.com/jamesbondfed * Only qualified IT professionals will be registered to attend.
Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer:
SecureAuth Location:
Arlington, VA
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.