Back to Search Begin New Search Save Search Auto-Notify
ATARC Federal Cybersecurity Integration...
The ATARC Federal Cybersecurity Integration Summit will be held on Wednesday, May 20 at the Renaissance Washington in Washington, D.C. This educational one-day symposium will feature cybersecurity subject matter experts from the Federal government and academia on panels with topics such as Information Sharing Across the Cyber Domain; Security: The Cornerstone of Federal IT; and The Future of Cybersecurity. (Agenda) The MITRE-ATARC Cybersecuri...
May 20, 2015
Organizer: ATARC
Location: Washington, DC
Add Favorite
Cybercrime Trends and Scenarios – What...
Cyberattacks continue to evolve and plague the global economy. What was once an annoyance and something financial institutions needed to worry about has now morphed into a worldwide epidemic of attacks, breaches of personal information, financial loss to consumers, and personal accountability placed on company executives and boards of directors. At the same time, there are dozens of companies that purport to “solve” the security pr...
May 19, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Cyber Insider Threat Virtual Course
Cyber Insider Threat provides an up to date look at the Insider Threat for government and commercial organizations. This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in thi...
May 14, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Connecting the Dots: Digital Authentica...
In response to growing demands for delivery of government services online, agencies are looking at methods for digital identity verification. The adoption of digital technology has changed the way government communication tools are created, managed, and delivered to citizens. Electronic documents pose a special challenge to the verification of their authenticity because they can be altered, possibly leading to unauthorized versions of governme...
May 12, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
The CTOvision Synergy Forum
The 2015 Synergy Forum brings together government and industry practitioners driving our collective technology futures. This is a multi-disciplinary event examining the emerging mashup of physical and digital worlds. Attendees include policy-makers, architects, program managers and influencers in the federal government and the most forward thinking engineers, architects and innovators in the American technology ecosystem. Organized by the anal...
April 30, 2015
Organizer: CTOvision.com
Location: Mclean, VA
Add Favorite
Cyber Insider Threat Training, Instruct...
This course provides students insight into documented insider threat cases, recent studies conducted on the insider threat, current government and industry guidance and best practices, as well as technical actions that can be taken to prevent, detect and handle the Cyber Insider Threat in their organization. Topics covered in this course include: What is a Cyber Insider Threat? Motivations of the Cyber Insider Threat Types of Cyber Insider Thr...
April 30, 2015
Organizer: Covenant Security Solutions, Inc.
Location: McLean, VA
Add Favorite
Privacy, Cybersecurity and Social Media
A discussion on privacy and how it is evolving with social media such as Facebook, Twitter and LinkedIn. We will discuss the differences between how this is being handled domestically in the United States versus the international views of other countries on privacy.
April 28, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
GITEC Summit 2015
GITEC Summit 2015: Innovate, Secure and Deliver Government Solutions Register now and reserve your complimentary government registration! Industry registrations are also available for purchase on our website. The GITEC Summit is the 2015 “must attend” conference for anyone working in public sector IT solutions. If you are an IT leader in the government, industry or academia, the Summit is the premier forum to share ideas, challenge...
April 26-28, 2015
Organizer: GITEC - The Government IT Executive Council
Location: Baltimore, MD
Add Favorite
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
April 23, 2015
Organizer: Covenant Security Solutions, Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search