2nd Annual Identity Management for DoD...
IDGA is pleased to announce the 2nd Annual Identity Management for DoD and Government: Enhancing Government Data Collection, Sharing, and Protection! This year's summit will provide unprecedented insight into government-wide interoperability of credentials and Public Key Infrastructure (PKI) adoption by examining the emergence of government-wide electronic authentication and identity management guidelines, mandates, and standards. Visit the Co...
CARVER Vulnerability Assessment
The Nation’s Critical Infrastructures face a myriad of physical and technical threats. These threats, whether natural, man-made, accidental or intentional, each carry a certain level of risk that could compromise national security, public safety, and the economy. The first step in securing Critical Infrastructures is the performance of a full spectrum Risk and Vulnerability Assessment (RVA). An RVA is an assessment of an organization...
Open-Source Intelligence
Acquiring open source intelligence (OSINT) requires more than just an ability to use the Internet. Special databases and off-line sources are among the many rich veins of intelligence which go unknown and untapped by law enforcement, business researchers, security personnel, terrorism, gang and financial researchers and intelligence analysts. This course provides a five step process developed over ten years and augmented by tips, hints, checkl...
Proven Strategies to Defend Your Data
In the fall of 2008, the Commander of the U.S. Strategic Command, responsible for the Department of Defense’s Global Information Grid (GIG) realized there was a problem with how its many and diverse users were unwittingly introducing malware into the department’s closed networks. The scope of the problem was significant, as the GIG comprises more than 15,000 local and regional area networks, engaging approximately seven million com...
Regional Collaboration in Cybersecurity...
The National Defense University’s Information Resources Management College (NDU iCollege) will be holding its 1st International Conference at the Shangri-La Hotel in Singapore July 13-14, 2010. The title of this event - “Regional Collaboration in Cybersecurity: Securing the Cloud, Web, and Virtual Networks” – brings together key components of today’s technology while answering the challenge of information security...
Pentaho Webcast: Agile BI: Making Busin...
Agile BI: Making Business Intelligence Work for the Organization Attendees of this webcast learned how: Organizational and IT managers can work closely together to accelerate BI project success by addressing the primary challenges across accessibility, technology, and financial barriers Changing demands and requirements are associated with evolving data warehousing and analytics needs Agile techniques can be utilized to enable tighter collabor...
Securing The Internet Of Things
Mocana, which secures the “Internet of Things,” protects the 20 billion non-PC devices that are increasingly connecting to networks across every sector of our economy including Federal and Medical. These devices already outnumber workstations on the Internet by about five to one. Each device represents a comparatively easy way to infiltrate the rest of the network as hacks, malware and viruses grow more numerous and sophisticated....
Gartner Security & Risk Management Summ...
2020 Vision: Leveraging Today's Best Insights to Manage Risk & Build a More Secure Future The Gartner Security & Risk Management Summit 2010 is the premier conference and meeting place for IT and business executives responsible for creating, implementing, and managing a proactive and comprehensive IT strategy for information security, risk management, compliance, and business continuity management. As IT security and risk disciplines...
June 21-23, 2010
Organizer:
Gartner Location:
National Harbor, MD
B2G Government Contractors Networking
B2G Government Contractors networking event is a monthly recurring event at the J F Kennedy Center, every 3rd Thursday of the month. This is a high-level professional event hosted by Jennifer Schaus & Associates along with MAK Advisors. There is no cost to attend. http://JenniferSchaus3.eventbrite.com
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.