Back to Search Begin New Search Save Search Auto-Notify
AGA Internal Control & Fraud Prevention...
Close to 600 government financial professionals and their counterparts in the private sector will convene to discuss fraud detection, data analytics, cyber security, improper payments and enterprise risk management. A sampling of sessions include: “Proactive Use of Data Analytics in Audits, Fraud Prevention and Detection,” addressing how to identify high-risk transactions and initiate investigations, ultimately reducing fraud, wast...
September 15, 2015
Organizer: Association of Government Accountants (AGA)
Location: Washington, DC
Add Favorite
2015 NSA-DHS-NIST Cybersecurity Innovat...
The 2015 Cybersecurity Innovation Forum is a three-day event hosted by the National Institute of Standards and Technology, and planned with the National Security Agency, and the Department of Homeland Security. This event brings government and industry together to focus on current, emerging, and future challenges, technologies, projects, solutions, and research in trusted computing, security automation, and information sharing. The technical p...
September 9-11, 2015
Organizer: Federal Business Council, Inc.
Location: Washington, DC
Add Favorite
SANS Virginia Beach 2015
Information security training in Virginia Beach from SANS Institute, the global leader in information security training. At SANS Virginia Beach 2015, SANS offers two weeks of hands-on, immersion-style security training courses taught by real-world practitioners. The site of SANS Virginia Beach 2015, August 24- September 4, is the Hilton Virginia Beach Oceanfront, located right on the boardwalk. Choose from top-rated SANS courses and use what y...
August 24 - September 4, 2015
Organizer: SANS Institute
Location: Virginia Beach, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
August 27, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
SANS San Jose 2015
SANS exceptional cybersecurity training comes to San Jose in July.We are pleased to invite you to SANS San Jose 2015, July 20-25. Are you ready to immerse yourself in the most intense computer training experience available anywhere? Do you need to become a more effective leader when implementing cybersecurity improvements for your organization? Do you need a more in-depth knowledge of the theory and implementation of computer security, virtual...
July 20-25, 2015
Organizer: SANS Institute
Location: San Jose, CA
Add Favorite
Finding the Rogue Insider
If you discovered an insider attack has taken place it's very likely too late to contain the damage. Finding rogue insiders before they act is critical. How can rogue insiders be identified in advance? What strategies can you undertake to find them before they act? Find out at our Webinar on "Finding the Rogue Insider". Why Are Organizations at Risk? Dial in and gain insight into why Rogue Insiders pose such a large threat. Be informed so you...
July 21, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
SANS Rocky Mountain 2015
Mile high...mile deep, SANS cybersecurity training!When you attend SANS Rocky Mountain 2015, you will see the SANS promise in action - what you learn in the classroom you will be able to use immediately upon returning to the office.Take advantage of the opportunity to put the skills you'll learn to practical use and join more than 64,000 GIAC certified professionals who make the IT security industry safe!Information security training in Denver...
June 22-27, 2015
Organizer: SANS Institute
Location: Denver, CO
Add Favorite
Cyber Security for Defense
Defending Cyberspace is never an easy task. In fact, it is one of the most difficult duties now facing the United States Military. How do you defend against an enemy, either foreign or homegrown, that can anonymously attack from any direction thereby potentially crippling entire units without firing a single shot? Ten million attacks per day on Pentagon computers. Try to visualize how large a number ten million is. It equals roughly 116 attack...
June 24-26, 2015
Organizer: IDGA
Location: Augusta, GA
Add Favorite
Safeguarding The Enterprise with Secure...
With data breaches continuing to make headlines on a weekly basis, public sector organizations are seeking solutions to protect sensitive data, including health, financial, and identity information. Delphix Secure Data as a Service – which combines virtual data and service-based masking – represents a transformative solution that succeeds where traditional data security approaches fail. With Delphix, application and IT teams get fu...
June 25, 2015
Organizer: i360Gov.com
Location: Webcast
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 23, 2015
Organizer: FEDINSIDER
Location: Midwest City, OK
Add Favorite
Back to Search Begin New Search