Where the Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 18, 2015
Organizer:
FEDINSIDER Location:
Golden, CO
US Export Controls Awareness Tool Kit
Avoid devastating fines and penalties for violations that could have been easily prevented with general awareness training for your company's employees. All the tools you need to build a solid foundation for your export compliance program including how to train large numbers of employees in a short period of time. Learn more by visiting our webpage.
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
June 9, 2015
Organizer:
FEDINSIDER Location:
Charleston, SC
TakeDownCon Capital Region Hacking and...
TAKEDOWNCON: CAPITAL REGION 2015 TakeDownCon, Hacking and IT Security Conference, is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on th...
May 28 - June 2, 2015
Organizer:
EC-Council Location:
East Hyattsville, MD
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 20, 2015
Organizer:
FEDINSIDER Location:
Bethesda, MD
Electromagnetic Spectrum Operations Summit
“Controlling the Fight in the Electromagnetic Spectrum” DSI’s Electromagnetic Spectrum Operations Summit is designed as an educational and training “Town Hall” forum, where thought leaders and key policy-makers across U.S. military and U.S. civilian organizations can come together for actionable discussions and debate. The Summit will focus on Supporting capabilities & technology that enables full spectrum ope...
Where The Mission & Technology Meet: Lo...
According to Gartner, citizen-centric government requires fundamental changes in information technology. Cloud computing provides the critical infrastructure, mobile-devices reach individuals directly, data fuels information, and security and privacy are mandatory. How do military and civilian agencies embrace emerging technology to meet their missions? Join your military and agency peers to explore innovative strategies and technologies your...
May 14, 2015
Organizer:
FEDINSIDER Location:
Albuquerque, NM
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
2015 North American IPv6 Conference
Two-day general session on IPv6 with a variety of speakers. Access to the Virtual Trade Show, playback of sessions, access to marketing materials and sponsor engagement through August, 2015. Learn about the benefits of using IPv6 from experts Gain valuable information to prepare you and your organization for this new wave of Internet innovation Lunch and refreshments provided Optional: One entire day of pre-conference tutorials (for an additio...
April 22-23, 2015
Organizer:
RMv6TF Location:
Greenwood Village, CO
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.