Back to Search Begin New Search Save Search Auto-Notify
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 4, 2015
Organizer: SecureAuth
Location: New York, NY
Add Favorite
Exclusive Technology Preview
Join us for an Exclusive Technology Preview: "Next Generation Adaptive Authentication using Behavioral Analysis" Security teams are increasingly using Adaptive Authentication to detect and protect from attacks using stolen credentials. Behavioral Analysis represents the newest Adaptive technique that uses passive analysis methods to detect anomalous user behavior. In this exclusive technology preview, security leaders from SecureAuth, BehavioS...
November 3, 2015
Organizer: SecureAuth
Location: Boston, MA
Add Favorite
Opening Doors to Cyber and Homeland Sec...
Law enforcement, public safety and homeland security professionals depend more and more on information technology and a secure digital infrastructure. Consequently, the demand for strategic cyber security experts with the necessary understanding of policy and procedure is growing rapidly. According to the US CERT, the transformative nature of cybersecurity work is providing for varying career paths – establishing a workforce with differe...
October 28, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Splunk Fundamentals Bootcamp
About the Splunk Fundamentals Bootcamp – Designed as an introduction to the capabilities, interface and basic search and reporting of Splunk. Emphasis is placed on investigation and discovery through demos and hands-on labs culminating in a customized situational dashboard. Previous experience with Splunk is not required. Where: Live Hands-on WebEx WebinarWhen: Check the GTRI Events Page for upcoming Bootcamps. Time: Wednesdays 11 a.m. ...
October 28, 2015
Organizer: Global Technology Resources, Inc. (GTRI)
Location: Webcast
Add Favorite
Face-to-Face Cybersecurity: IT Executiv...
It’s clear that cybersecurity concerns will dominate the IT landscape for the nation and the world in 2015. Although Federal agencies have been focused on strengthening their networks, facilities, and data from cyber attacks for years, the aggressors are more capable, sophisticated, and motivated than ever. Given this harsh reality, it is essential that Federal IT executives and their senior leadership have frank and open dialogue about...
October 27, 2015
Organizer: 1105 Media Public Sector Events
Location: Washington, DC
Add Favorite
Executive Leadership Conference
ELC 2015 will focus on new technologies and service-delivery models that now allow us to meet and exceed mission challenges with greater efficiency and effectiveness. Among the topics that we will examine is; NS2020 and the evolving strategy for the next generation of telecommunications and information technology (IT) infrastructure services; Market Intelligence and the challenge to expand the focus of engagement with industry away from simply...
October 25-27, 2015
Organizer: ACT-IAC
Location: Williamsburg, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
October 22, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Splunk GovSummit 2015
Event Theme: Analytics Now- Our Future Lies in the Questions We Ask Today Join government IT, security, program, and management professionals at this one-day event to learn how government is using data today to make a difference in the future. Whether your agency has its sights set on improving security posture, maximizing the value of services delivered, or driving efficiencies, GovSummit sessions and discussions will provide you with the ins...
October 22, 2015
Organizer: Splunk
Location: Washington, DC
Add Favorite
VMware vForum DC
Go Ahead. Gain Insight, Ideas and an Action Plan VMware vForum is a free one-day event that offers a unique setting for IT professionals to engage with experts and learn about the latest technologies, tips, and trends in the field. Join us on October 22, 2015 in Washington, DC! It doesn’t matter whether you are at the start of your journey or already have an advanced deployment plan—join us as we help you navigate your IT journey a...
October 22, 2015
Organizer: VMware
Location: Washington, DC
Add Favorite
Exfiltration & Government: Designing an...
More than one-third of all cyber-crime incidents and security breaches are caused by insiders. These insiders have many motivations — financial, political, or even emotional — but the common factor is they all inappropriately access an organization’s critical-value data. While governments around the world have communicated the importance of addressing insider threats, real-world efforts have been patchy. It is easy to underst...
October 22, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
Back to Search Begin New Search