Back to Search Begin New Search Save Search Auto-Notify
Government Innovators Virtual Summit
GovLoop’s 4th Annual Government Innovators Virtual Summit is helping you piece together the government tech puzzle. Join us on Wednesday, April 22nd to get real tips to tackle some of government’s biggest challenges. We know turning your data into meaningful information can lead to big changes, but how do you actually make sense of your big data? The Internet of Everything is here, but what does that really mean and how do you maxi...
April 22, 2015
Organizer: DLT Solutions
Location: Webcast
Add Favorite
Protecting People, Facilities and Information
This workshop has been especially developed for the decision makers, so that they can formulate policy that translates into plans and procedures that provide for the safety and well-being of personnel. Course curriculum focuses on protecting personnel, the facilities they work in and the information systems they use. Students will learn what constitutes suspicious behavior, how and what to report, Counter-surveillance techniques, what actions...
March 24-25, 2015
Organizer: Haines Security Solutions
Location: Oxnard, CA
Add Favorite
Designing Secure Buildings
A workshop designed to familiarize students with design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Window Systems, Lighting, Vehicle Barrier Selection, Electronic Secur...
March 17-19, 2015
Organizer: Haines Security Solutions
Location: Oxnard, CA
Add Favorite
Fortify Privileged Passwords for the 20...
With nearly 30 years of security experience, we will explore privileged account management challenges facing Federal IT professionals today and highlight our unique methodology for controlling access to your mission critical information. You will learn how asset scanning and auto-discovery techniques can be used to proactively preempt attackers from exploiting privileged and service accounts. You’ll also learn how to create a positive en...
March 18, 2015
Organizer: Beyond Trust
Location: Washington, DC
Add Favorite
Speed Mentoring hosted by INSA's Intell...
Join INSA’s Intelligence Champions Council (ICC) for its third Speed Mentoring event on Thursday, March 12, 2015, beginning at 5:30 pm at the Mandarin Oriental in Washington, D.C. INSA's Speed Mentoring events are an opportunity to build connections among students, early stage professionals, and experienced mentors in the intelligence and national security communities. These events are energizing for both the early stage professionals as...
March 12, 2015
Organizer: Intelligence National Security Alliance
Location: Washington, DC
Add Favorite
ACT-IAC Rocky Mountain Breakfast featur...
The Rocky Mountain Chapter of the American Council for Technology & Industry Advisory Council (ACT-IAC) is pleased to announce that Mike Anderson, Vice President of Marketing from ReliAscent and member of the U.S. Small Business Administration’s Region VIII Regulatory Fairness Board, will speak at The Egg & I on March 10th about DCAA Compliance, the SBA’s Ombudsman and the Regulatory Fairness Board. During this presentation...
March 10, 2015
Organizer: ACT-IAC
Location: Lakewood, CO
Add Favorite
Certified CISO (CCISO)
NEW DATE! EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assu...
March 2-6, 2015
Organizer: EC-Council
Location: Greenbelt, MD
Add Favorite
Security Criteria Development
This workshop focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also...
March 3-5, 2015
Organizer: Haines Security Solutions
Location: Oxnard, CA
Add Favorite
The Business Case for Cloud Computing i...
The White House’s Cloud First Federal IT policy has given agencies firm direction to look to the cloud for data management solutions, and public sector organizations have embraced the benefits. The technology aspects of cloud computing are well known to agency CIOs and their staffs, but the development of a solid business case is a critical first step. Complicating the development of the business case is the fact that agencies are dealin...
March 3, 2015
Organizer: FEDINSIDER
Location: Webcast
Add Favorite
How to Develop an Effective Identity an...
Password management, user access and security are not what they used to be. The complexity of managing various platforms requiring different authentication, different regulatory regimes, and of course, budget and IT department constraints is high. And so are the risks associated with poor governance! Federal agencies need an effective and holistic identity and acceess management (IAM) strategy. But where do you start? Join us on Thursday, Febr...
February 5, 2015
Organizer: GovLoop
Location: Webcast
Add Favorite
Back to Search Begin New Search