Back to Search Begin New Search Save Search Auto-Notify
Bridging The Great Minority Cybersecuri...
Cybersecurity has been identified as one of the most serious economic and national security challenges we face as a nation. Sadly however, there is global underrepresentation of women and other historically underrepresented minority groups (African Americans and Hispanics) in the fast-growing discipline of cybersecurity in the United States of America. "Grassroot Efforts” to increase the number of minority students pursuing cybersecurity...
November 17, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Information Sharing: From Compliance to...
The Administration has voiced the imperative that cybersecurity threat information be shared between private sector and government to enable U.S. companies to work together and with the Federal government to respond to threats, rather than operating alone. This webinar will feature an in-depth discussion of who is leading the charge against cybercrime, and how government and industry can collaborate to protect and deter cyber criminals from be...
November 17, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
GTRA SecureGOV Council Summit
Faced with an ever-changing IT environment, federal CIOs/CISOs are dauntingly challenged with the need to stay ahead of new and more sophisticated security threats. Yet, achieving this ‘holy grail’ is no easy feat, as the complexities related to securing all key elements of IT are tremendous. GTRA’s SecureGOV Summit & Council Meeting has been designed to unite leaders to address the critical strategic and technology issue...
November 15-17, 2015
Organizer: Government Technology Research Alliance (GTRA)
Location: Hot Springs, VA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 13, 2015
Organizer: SecureAuth
Location: Chicago, IL
Add Favorite
State and Local Cybersecurity: A Guide...
When it comes to cybersecurity, state and local have an opportunity to build on significant work already done by the federal government. This includes standards and processes for defining an overarching cyber framework and establishing a baseline for cloud security, as well as a contract for buying continuous diagnostics and mitigation solutions. Register now for this free virtual event, where federal cybersecurity experts will provide state a...
November 12, 2015
Organizer: 1105 Media Public Sector Events
Location: Webcast
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 12, 2015
Organizer: SecureAuth
Location: Costa Mesa, CA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 10, 2015
Organizer: SecureAuth
Location: Palo Alto, CA
Add Favorite
James Bond Movie Premier!
You're invited to a screening premier of Spectre, the last James Bond film. A brief presentation prior to the movie will show you how the Quantum approach to storage is different. Shaken, not stirred. Friday, Nov 6 8-11am You must register* to attend. www.quantum.com/jamesbondfed * Only qualified IT professionals will be registered to attend.
November 6, 2015
Organizer: Quantum Corporation
Location: McLean, VA
Add Favorite
Cybersecurity in Government Contracts I...
Federal Publications Seminars announces a first-of-its-kind certificate program for government contracting and legal professionals that will provide a knowledge baseline for preparing and implementing information security plans, practices, and procedures. This 5-day program will offer two parallel tracks: one for CyberContracting™ Management and one for CyberContracting™ Law, both leading to the CyberContracting™ Certificate....
November 2-6, 2015
Organizer: Federal Publications Seminars
Location: McLean, VA
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 5, 2015
Organizer: SecureAuth
Location: Arlington, VA
Add Favorite
Back to Search Begin New Search