Back to Search Begin New Search Save Search Auto-Notify
TakeDownCon Capital Region Hacking and...
TAKEDOWNCON: CAPITAL REGION 2015 TakeDownCon, Hacking and IT Security Conference, is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on th...
May 28 - June 2, 2015
Organizer: EC-Council
Location: East Hyattsville, MD
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
May 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Charleston, SC
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer: FEDINSIDER
Location: Bethesda, MD
Add Favorite
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer: FEDINSIDER
Location: Albuquerque, NM
Add Favorite
SANS Security Operations Center Summit...
As we see regularly in the news, the number of successful data breaches continues to increase. Adversaries seem to have the upper hand, as many organizations fail to effectively detect and quickly respond to these breaches. Over 80% of all breach victims learn of a compromise from third-party notifications, not from internal security teams, and are often caught by surprise. As a result, executives are demanding that their security teams provid...
April 24 - May 1, 2015
Organizer: SANS Institute
Location: Arlington, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
April 30, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
2015 North American IPv6 Conference
Two-day general session on IPv6 with a variety of speakers. Access to the Virtual Trade Show, playback of sessions, access to marketing materials and sponsor engagement through August, 2015. Learn about the benefits of using IPv6 from experts Gain valuable information to prepare you and your organization for this new wave of Internet innovation Lunch and refreshments provided Optional: One entire day of pre-conference tutorials (for an additio...
April 22-23, 2015
Organizer: RMv6TF
Location: Greenwood Village, CO
Add Favorite
SANS 2015
We would like to invite you back to SANS 2015 and back to Disney for our biggest cybersecurity event of the year! If you haven't been to SANS training in Orlando, you can't miss this! This is one of our biggest events of the year, so there is something for everyone. At SANS 2015, you will have countless opportunities to expand your network of security experts and friends, and you'll learn more than you can imagine. Many of our five- and six-da...
April 11-18, 2015
Organizer: SANS Institute
Location: Orlando, FL
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
April 9, 2015
Organizer: FEDINSIDER
Location: San Diego, CA
Add Favorite
Where the Mission and Technology Meet:...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
March 31, 2015
Organizer: FedInsider
Location: San Antonio, TX
Add Favorite
Back to Search Begin New Search