Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
Cyber Operations Tools: Stemming the Th...
The threat of persistent and malicious cyber-attacks continues to rise, and the government is taking decisive action to ensure that cyberspace remains a national asset rather than a strategic liability. As agencies seeks ways to identify cyber-threat patterns and stem the tide of intrusive actions, training on the transformative leaps that current I.T. tools provide is needed. That’s why cybersecurity professionals are invited to spend a...
March 12, 2015
Organizer:
FEDINSIDER Location:
Arlington, VA
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer:
EC-Council Location:
Greenbelt, MD
SolarWinds Federal User Group- Austin 2015
Ready to step up your IT management game? Want to know how other federal agencies are solving IT challenges? Curious about SolarWinds newest products and features? Please join us on February 26th in downtown Austin, Texas for a live, in-person federal user group. Meet SolarWinds’ technical experts and leaders, Federal systems engineers, and military, civilian, and contractor users of SolarWinds software. You’ll begin with breakfas...
February 26, 2015
Organizer:
SolarWinds Location:
Austin, TX
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer:
GovLoop Location:
Webcast
TechExpo Top Secret Maryland Hiring Event
Be strategic with your career search - industry leading employers choose TECHEXPO, the nation's leading producer of Security-Cleared hiring events, each month to recruit & hire qualified candidates like yourself. We also encourage you to share this information with your network of cleared professionals that are qualified to attend. TECHEXPO Top Secret VA Hiring Event Wednesday, January 14 - 10am - 3pm Ritz-Carlton Tysons Corner 1700 Tysons...
Cyber Series: How to Thwart the Governm...
Today’s organizations and federal agencies have to protect their sensitive data from their own – it’s a simple fact of IT life these days. Thorough cybersecurity plans naturally protect an agency's secret or sensitive information from outsiders, but it’s become all too obvious in recent years that federal cybersecurity efforts must also safeguard that vital data from trusted insiders. Through malicious action or neglige...
Cybersecurity 2015: Beyond the Breach
With each new cybersecurity attack businesses lose millions, governments lose information and citizens lose trust. At the end of a year where these attacks regularly dominated headlines, what’s ahead for government affairs, security experts, academia and policy makers in 2015? Bloomberg Government is bringing the nation’s top decision-makers together for the year’s definitive conversation on Washington cybersecurity policy. J...
The Watchful Eye: Mitigating Risk in th...
COMPLIMENTARY BRIEFING The Watchful Eye: Mitigating Risk in the Cloud Date: Wednesday, December 3, 2014 Time: 8:00 - 10:30 AMCost: Complimentary Credits: 3 CPEs/CEUs Focus: Government agencies are adopting a Cloud First approach to do more with existing resources while rapidly opening up new ways to meet citizens’ demands to engage with agencies online. Using a pay-as-you-go model, agencies can now access a broad portfolio of middleware...
Digital Spies: Encryption, Internet Tra...
According to Gartner, 50% of all network attacks will hide in internet traffic by 2017. This so-called SSL encrypted traffic is pervasive and while it can improve the security of data, it also bypasses most policy enforcement points. This creates a significant data security, privacy and compliance risk for government agencies. Indeed, hackers can evade 80% of agency network defenses by tunneling attacks in encrypted traffic. Our citizens and i...
November 12, 2014
Organizer:
FEDINSIDER Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.